Research Article
Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption
Figure 16
Occlusion attack analysis results of the cipher Chocolate image. ((a)–(d)) The cipher Chocolate image with 1/256, 1/64, 1/16, and 1/4 occlusion; ((e)–(h)) decryption results for the images above.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |