Research Article

Image Encryption with Double Spiral Scans and Chaotic Maps

Figure 13

Visual result of differential attack.
(a) Encryption result of the modified Lena
(b) Difference between (a) and the original encrypted Lena