Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

Figure 12

The simulation results of (a) original, (b) encrypted, and (c) decrypted images for both FFT and DCT based traditional techniques.
(a)
(b)
(c)