Skip to main content

Table 9 Compute \( \hat{\mathbb{C}}\left(x\left)\right(i,j\right) \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)

\( \hat{\mathbb{C}}\left({x}_1\right) \)

\( \hat{\mathbb{C}}\left({x}_2\right) \)

\( \hat{\mathbb{C}}\left({x}_3\right) \)

\( \hat{\mathbb{C}}\left({x}_4\right) \)

\( \hat{\mathbb{C}}\left({x}_5\right) \)

(i1, j1)

60

60

60

60

60

(i1, j2)

60

60

60

60

60

(i1, j3)

60

60

60

60

60

(i2, j1)

60

60

60

60

60

(i2, j2)

0.1776

0.08208

0.0892

0.0632

0.083

(i2, j3)

60

60

60

60

60

(i3, j1)

60

60

60

60

60

(i3, j2)

60

60

60

60

60

(i3, j3)

60

60

60

60

60