Research Article
A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
Figure 6
Encryption and reconstruction of four plain images: (a) plain image Lena; (b) cipher image of (a); (c) compressed cipher image of (a); (d) reconstructed image of (c); (e) plain image of Boats; (f) cipher image of (e); (g) compressed cipher image of (e); (h) reconstructed image of (g); (i) plain image of House; (j) cipher image of (i); (k) compressed cipher image of (i); (l) reconstructed image of (k); (m) plain image of Parrots; (n) cipher image of (m); (o) compressed cipher image of (m); (p) reconstructed image of (o).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |