Research Article

A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

Figure 13

Chosen plain image attack: (a) chosen black plain image, (b) cryptogram of black image and possible secret key, (c) cryptogram of fingerprint image, and (d) decryption of encrypted fingerprint with the possible secret key.
(a)
(b)
(c)
(d)