Research Article

An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map

Table 4

Chosen/known plain-image attack.

Methods[31][32][33][34][35]Ours

Pass or not No No No Pass No Pass