Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Tab 5
/
Research Article
Image Encryption with Fusion of Two Maps
Table 5
Comparison of some ciphers using Lena as test image: TR: time required; RND: round numbers of diffusion; AC: average correlation; KS: key space;
H
: entropy; VH: variance of histograms.
Algorithm
TR (s)
RND
AC
KS
H
VH
UACI (%)
NPCR (%)
Proposed scheme
1.2
1
0.0024
7.2 × 10
134
7.9993
1091.1
33.41
99.6
[
28
]
1.69
0.017
7.9984
31.71
99.42
[
30
]
5.5
0.032
7.86 × 10
366
7.9993
819.48
33.47
99.64
[
31
]
0.0005
7.9998
33.47
99.64
[
32
]
1
0.0112
10
79
7.997
33.45
99.6
[
27
]
0.006
5
0.059
7.2 × 10
134
7.819
31.15
99.63