Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2019
/
Article
/
Fig 13
/
Research Article
Image Encryption with Double Spiral Scans and Chaotic Maps
Figure 13
Visual result of differential attack.
(a)
Encryption result of the modified Lena
(b)
Difference between (a) and the original encrypted Lena