Research Article

Image Encryption with Fusion of Two Maps

Figure 12

CPA cryptanalysis attack: (a) Barbara; (b) neutral image; (c) encrypted image of Barbara; (d) extracted key map; (e) decrypting (c) with (d).
(a)
(b)
(c)
(d)
(e)