Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

Figure 27

The histogram analysis for (a) original, (b) encrypted, and (c) decrypted images for the sixth proposed technique.
(a)
(b)
(c)