Research Article
The Design and Its Application in Secure Communication and Image Encryption of a New Lorenz-Like System with Varying Parameter
Figure 12
Key sensitivity test. (a) Original image (plaintext); (b), (c), (d), (e) the encrypted images with different keys as Table 3; (f) decrypt (b) with key ; and (g) decrypt (b) with key (2.5–, −).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |