Research Article
A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
Figure 9
Key sensitivity test for decryption process: (a) obtained by ; (b) decrypted image obtained by ; (c) decrypted image obtained by ; (d) decrypted image obtained by ; (e) difference image between and .
(a) |
(b) |
(c) |
(d) |
(e) |