Research Article

An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem

Figure 9

The cipher images and their decrypted images after data loss attacks. (a) 1/64 occlusion. (b) 1/16 occlusion. (c) 1/4 occlusion. (d) Decrypted image with 1/64 occlusion. (e) Decrypted image with 1/16 occlusion. (f) Decrypted image with 1/4 occlusion.
(a)
(b)
(c)
(d)
(e)
(f)