Research Article

Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption

Figure 16

Occlusion attack analysis results of the cipher Chocolate image. ((a)–(d)) The cipher Chocolate image with 1/256, 1/64, 1/16, and 1/4 occlusion; ((e)–(h)) decryption results for the images above.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)