Chaotic Image Encryption Algorithm Based on Circulant Operation
Figure 2
Encryption and decryption: (a) plain-image of Lena, (b) cipher-image, (c) decrypted image with key , (d) decrypted image with key , (e) decrypted image with key , and (f) decrypted image with key .