Research Article
Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption
Figure 14
The correlation results of the Chocolate image and the encrypted Chocolate image. (a) (H, V, D) correlation of the Chocolate image in R; (b) (H, V, D) correlation of the Chocolate image in G; (c) (H, V, D) correlation of the Chocolate image in B; (d) (H, V, D) correlation of the encrypted Chocolate image in R; (e) (H,V, D) correlation of the encrypted Chocolate image in G; (f) (H, V, D) correlation of the encrypted Chocolate image in B.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |
(q) |
(r) |