-
1
Experimental images&Table1-10&Figure1-15.docx
Published 2025“…<p dir="ltr">A Robust Color Image Encryption Algorithm Based on 2D-SQSM Hyperchaotic Map and Cyclic Shift Scrambling</p>…”
-
2
Decrypted color plain.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
3
Keys space.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
4
Encryption and decryption time (unit: Seconds).
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
5
Red plain horizontal correlation.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
6
Bifurcation diagram of LSS for <i>β</i> = 200.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
7
Blue plain.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
8
Information entropy.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
9
Green cipher diagonal correlation.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
10
Green cipher vertical correlation.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
11
NPCR and UACI (%).
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
12
Green cipher histogram.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
13
Red cipher diagonal correlation.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
14
Red plain vertical correlation.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
15
Encrypted blue plain.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
16
Bifurcation diagram of TLS for <i>β</i> = 50.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
17
Information entropy comparison.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
18
Decrypted green plain.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
19
Color plain.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
-
20
Image decryption algorithm flow chart.
Published 2025“…<div><p>Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”