Research Article

Image Encryption with Double Spiral Scans and Chaotic Maps

Figure 12

Histograms of the encrypted images generated by [6].
(a) Red component of Lake
(b) Green component of Lake
(c) Blue component of Lake
(d) Goldhill