Research Article

A Chaos-Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps

Figure 6

Analysis of noise attack.