Research Article

A New Image Encryption Scheme Based on Hybrid Chaotic Maps

Figure 12

The simulation steps: (a) LL component; (b) LH component; (c) HL component; (d) HH component; (e) LL component confusion; (f) LH component confusion; (g) HL component confusion; (h) HH component confusion; (i) original image; (j) overall confusion; (k) encrypted image; and (l) decrypted image.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)