Research Article

SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm

Figure 6

Iterative curves of SSA and LCSSA under 4 benchmark functions.
(a) Iterative convergence curve when is used as the benchmark function
(b) Iterative convergence curve when is used as the benchmark function
(c) Iterative convergence curve when is used as the benchmark function
(d) Iterative convergence curve when is used as the benchmark function