Research Article
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism
Figure 3
Key Sensitivity Analysis. (a) Change a restoring diagram. (b) Change b restoring diagram. (c) Change c restoring diagram. (d) Change restoring diagram. (e) Change restoring diagram. (f) Change restoring diagram.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |