Skip to main content

Table 7 Mapping M : X → R,by \( {\mathbb{C}}_M(x)={\sum}_{\left(i,j\right)\in {I}^2}\beta (x)\left(i,j\right) \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)

\( \hat{\mathbb{C}}\left({x}_1\right) \)

\( \hat{\mathbb{C}}\left({x}_2\right) \)

\( \hat{\mathbb{C}}\left({x}_3\right) \)

\( \hat{\mathbb{C}}\left({x}_4\right) \)

\( \hat{\mathbb{C}}\left({x}_5\right) \)

(i1, j1)

60

60

60

60

60

(i1, j2)

0.1368

0.0196

60

60

60

(i1, j3)

60

60

60

60

60

(i2, j1)

0.1576

0.03408

0.0892

0.0632

0.083

(i2, j2)

0.1168

0.0196

0.0032

0.0245

0.0022

(i2, j3)

0.1576

0.11736

0.0892

0.0632

0.083

(i3, j1)

60

60

60

60

60

(i3, j2)

0.1368

0.0196

0.0044

0.0245

0.0224

(i3, j3)

60

60

60

60

60

M

120.5688

60

60

60

0