Research Article
Image Encryption with Fusion of Two Maps
Figure 11
Key sensitivity analysis: (a), (e), (i) plain images; (b), (f), (j) encrypted images by x10; (c), (g), (k) decrypted images by changing x10 by x10 + 10−15; (d), (h), (l) difference images between (b) and (c), (f) and (g), (j) and (k), respectively.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |