Table 12 The comparison between the proposed scheme and other image encryption schemes.
From: An image encryption scheme based on public key cryptosystem and quantum logistic map
Image | Reference | Information Entropy | ||
---|---|---|---|---|
R | G | B | ||
Baboon | This paper | 7.9993 | 7.9993 | 7.9991 |
7.9992 | 7.9993 | 7.9990 | ||
7.9914 | 7.9915 | 7.9915 | ||
7.9991 | 7.9991 | 7.9993 | ||
7.9974 | 7.9992 | 7.9994 | ||
7.9993 | 7.9993 | 7.9993 | ||
7.9992 | 7.9993 | 7.9992 | ||
Peppers | This Paper | 7.9993 | 7.9994 | 7.9992 |
7.9986 | 7.9987 | 7.9985 | ||
7.9979 | 7.9979 | 7.9979 | ||
7.9911 | 7.9912 | 7.9915 | ||
7.9989 | 7.9991 | 7.9989 | ||
7.9972 | 7.9971 | 7.9969 | ||
7.9992 | 7.9992 | 7.9993 | ||
7.9992 | 7.9992 | 7.9993 |