Research Article

Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

Figure 8

Histograms of original and encrypted images.
(a)
(b)