Research Article

A New Image Encryption Scheme Based on Hybrid Chaotic Maps

Figure 16

Decrypted process with key sensitivity (a) using same keys of encrypted and (b,c) using the error keys.
(a)
(b)
(c)