Research Article
A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
Figure 10
Pixel value distribution histograms of elaine.512.tiff, 7.1.03.tiff, gray21.512.tiff, and their corresponding cipher images: (a) elaine.512.tiff; (b) histogram of (a); (c) cipher image of (a); (d) histogram of (c); (e) 7.1.03.tiff; (f) histogram of (e); (g) cipher image of (e); (h) histogram of (g); (i) gray21.512.tiff; (j) histogram of (i); (k) cipher image of (i); (l) histogram of (k).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |