An image encryption scheme based on three-dimensional Brownian motion and chaotic system
Chai Xiu-Li1, 2, †, Gan Zhi-Hua3, Yuan Ke1, Lu Yang4, Chen Yi-Ran2
       

Decryption results with different keys, showing (a) recovered image with K, (b) recovered image with K 1, and (c) subtraction of Fig. 10(b) from Fig. 6(c).