Research Article

Image Encryption with Fusion of Two Maps

Figure 11

Key sensitivity analysis: (a), (e), (i) plain images; (b), (f), (j) encrypted images by x10; (c), (g), (k) decrypted images by changing x10 by x10 + 10−15; (d), (h), (l) difference images between (b) and (c), (f) and (g), (j) and (k), respectively.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)