Research Article
DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks
Figure 15
The simulation results of (a) original image, (b) stegoimage, (c) LL component, (d) LH component, (e) HL component, and (f) HH component of encrypted and (g) decrypted images for the second proposed technique.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |