Research Article

Chaotic Image Encryption Based on Running-Key Related to Plaintext

Figure 3

Encryption results analyses.
490179.fig.003a
(a) Lena
490179.fig.003b
(b) Lena histogram
490179.fig.003c
(c) Cipher-Lena histogram
490179.fig.003d
(d) Penguin
490179.fig.003e
(e) Penguin histogram
490179.fig.003f
(f) Cipher-Penguin histogram