Research Article

A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture

Figure 16

Secret key sensitivity test results under one round of the proposed algorithm. (a) Encrypted image. (b) Decrypted image with . (c) Decrypted image with . (d) Decrypted image with . (e) Decrypted image with . (f) Decrypted image with . (g) Decrypted image with . (h) Decrypted image with .
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)