Research Article
An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem
Figure 9
The cipher images and their decrypted images after data loss attacks. (a) 1/64 occlusion. (b) 1/16 occlusion. (c) 1/4 occlusion. (d) Decrypted image with 1/64 occlusion. (e) Decrypted image with 1/16 occlusion. (f) Decrypted image with 1/4 occlusion.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |