Research Article

Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism

Figure 3

Key Sensitivity Analysis. (a) Change a restoring diagram. (b) Change b restoring diagram. (c) Change c restoring diagram. (d) Change restoring diagram. (e) Change restoring diagram. (f) Change restoring diagram.
(a)
(b)
(c)
(d)
(e)
(f)