Research Article

Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

Figure 6

Original, encrypted, and decrypted images.
(a)
(b)
(c)