15 research outputs found

    NPCR and UACI of the color image of Lena when changing one pixel and permutation rounds <i>n</i> = 10.

    No full text
    <p>NPCR and UACI of the color image of Lena when changing one pixel and permutation rounds <i>n</i> = 10.</p

    Test of image under brightening and darkening.

    No full text
    <p>(a) Brightened cipher-image of Lena, (b) decrypted image under brightening, (c) darkened cipher-image of Lena, (d) decrypted image under darkening.</p

    Test of noise addition.

    No full text
    <p>(a) Original image of Lena, (b) encrypted image of Lena without noise addition, (c) encrypted image of Lena under adding Pepper & Salt noise with noise density 0.005, (d) decrypted image under Pepper & Salt noise addition (noise density 0.005), (e) encrypted image of Lena under adding Pepper & Salt noise with noise density 0.05, (f) decrypted image under Pepper & Salt noise addition (noise density 0.05), (g) encrypted image of Lena under adding Pepper & Salt noise with noise density 0.5, (h) decrypted image under Pepper & Salt noise addition (noise density 0.5), (i) encrypted image of Lena under Gaussian white noise addition, (j) decrypted image under Gaussian white noise addition.</p

    Test of image under rotation.

    No full text
    <p>(a) Rotated cipher-image of Lena, (b) decrypted image under rotation.</p

    Test of image under cropping.

    No full text
    <p>(a) Cropped cipher-mage by removing 25% of the encrypted image of Lena (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0119660#pone.0119660.g014" target="_blank">Fig. 14(b)</a>), (b) decrypted image of the cropped cipher-image (a), (c) cropped cipher-mage by removing 50% of the encrypted image of Lena (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0119660#pone.0119660.g014" target="_blank">Fig. 14(b)</a>), (d) decrypted image of the cropped cipher-image (c).</p

    Comparison of encryption time between our proposed method and some other cryptosystems.

    No full text
    <p>Comparison of encryption time between our proposed method and some other cryptosystems.</p

    The chaotic behaviors of systems (2) and (3).

    No full text
    <p>(a) The spatiotemporal attractor of the 2D CML (2) with <i>μ</i> = 1.8 and <i>ε = 0</i>.<i>1</i>, (b) the chaotic attractor of the fractional-order Chen system (3) with <i>α</i><sub>1</sub> = <i>α</i><sub>2</sub> = <i>α</i><sub>3</sub> = 0.9.</p

    Some original plain-images used in Table 6.

    No full text
    <p>(a) City gate tower, (b) Elephantine mountain, (c) Pandas, (d) Peony.</p

    Comparison of the average NPCR and UACI values on the color image of Lena.

    No full text
    <p>Comparison of the average NPCR and UACI values on the color image of Lena.</p

    Experimental results for Vegetables image.

    No full text
    <p>(a) Original image of Vegetables, (b) encrypted image of Vegetables, (c) decrypted image of Vegetables.</p
    corecore