Research Article
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture
Figure 16
Secret key sensitivity test results under one round of the proposed algorithm. (a) Encrypted image. (b) Decrypted image with . (c) Decrypted image with . (d) Decrypted image with . (e) Decrypted image with . (f) Decrypted image with . (g) Decrypted image with . (h) Decrypted image with .
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |