Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

Figure 21

The histogram analysis of (a) original, (b) encrypted, and (c) decrypted images for DWT based modified technique.
(a)
(b)
(c)