Research Article

A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps

Figure 9

Key sensitivity test for decryption process: (a) obtained by ; (b) decrypted image obtained by ; (c) decrypted image obtained by ; (d) decrypted image obtained by ; (e) difference image between and .
(a)
(b)
(c)
(d)
(e)