Table 13 MLC comparison of Pepper image using proposed S-box with various other S-boxes.
From: A study of text-theoretical approach to S-box construction with image encryption applications
From: A study of text-theoretical approach to S-box construction with image encryption applications