Research Article
A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map
Figure 13
Chosen plain image attack: (a) chosen black plain image, (b) cryptogram of black image and possible secret key, (c) cryptogram of fingerprint image, and (d) decryption of encrypted fingerprint with the possible secret key.
(a) |
(b) |
(c) |
(d) |