Research Article

Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

Table 3

Encryption time and comparisons ( “pepper” image).

Encryption time (s)

This work0.4865
Ref. [52]1.6734
Ref. [58]3.704
Ref. [59]0.712
Ref. [60]5.6544
Ref. [61]0.5630