Research Article

The Design and Its Application in Secure Communication and Image Encryption of a New Lorenz-Like System with Varying Parameter

Table 3

Differences between encrypted images produced by slightly different keys.

⁢Encryption keys (I)
Figure 12(b)
Encryption keys (II)Difference ratio between (I) and (II) (%)

9.3Figure 12(c)99.61
2.59.39.3Figure 12(d)99.60
Figure 12(e)99.60