Research Article
A New Image Encryption Scheme Based on Hybrid Chaotic Maps
Figure 12
The simulation steps: (a) LL component; (b) LH component; (c) HL component; (d) HH component; (e) LL component confusion; (f) LH component confusion; (g) HL component confusion; (h) HH component confusion; (i) original image; (j) overall confusion; (k) encrypted image; and (l) decrypted image.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |