Research Article

An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation

Figure 8

Key sensibility.