Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

Figure 18

The simulation results for (a) original image, (b) stegoimage, (c) encrypted image, and (d) decrypted image for the fifth proposed technique.
(a)
(b)
(c)
(d)