Research Article

Chaotic Image Encryption Algorithm Based on Circulant Operation

Figure 2

Encryption and decryption: (a) plain-image of Lena, (b) cipher-image, (c) decrypted image with key , (d) decrypted image with key , (e) decrypted image with key , and (f) decrypted image with key .
384067.fig.002a
(a)
384067.fig.002b
(b)
384067.fig.002c
(c)
384067.fig.002d
(d)
384067.fig.002e
(e)
384067.fig.002f
(f)