Research Article
Image Encryption Performance Evaluation Based on Poker Test
Figure 3
Encryption results with Arnold’s cat map.
(a) Original |
(b) Iteration 1 |
(c) Iteration 2 |
(d) Iteration 3 |
(e) Iteration 4 |
(f) Iteration 5 |
(g) Iteration 6 |
(h) Iteration 7 |
(i) Iteration 8 |
(j) Iteration 9 |
(k) Iteration 10 |
(l) Iteration 11 |
(m) Iteration 12 |
(n) Iteration 13 |
(o) Iteration 14 |
(p) Iteration 15 |