Research Article
DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks
Figure 13
The simulation results of (a) original, (b) LL component, (c) LH component, (d) HL component, and (e) HH component of encrypted and (f) decrypted images for modified DWT based technique.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |