Research Article
Image Encryption with Double Spiral Scans and Chaotic Maps
Figure 12
Histograms of the encrypted images generated by [6].
(a) Red component of Lake |
(b) Green component of Lake |
(c) Blue component of Lake |
(d) Goldhill |
(a) Red component of Lake |
(b) Green component of Lake |
(c) Blue component of Lake |
(d) Goldhill |