Research Article

A Hyperchaotic Color Image Encryption Algorithm and Security Analysis

Figure 1

Chaotic attractors of system (1).

(a) x-y-z
(b) x-u