Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

Figure 16

The simulation results of (a) original image, (b) stegoimage, (c) LL component, (d) LH component, (e) HL component, and (f) HH component of encrypted and (g) decrypted images for the third proposed technique.
(a)
(b)
(c)
(d)
(e)
(f)
(g)