Research Article

A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps

Figure 7

Encryption and decryption effects for different types of images: (a) f15.png; (b) cipher image of (a); (c) decrypted image of (b); (d) 5.2.09.tiff; (e) cipher image of (d); (f) decrypted image of (e); (g) gray21.512.tiff; (h) cipher image of (g); (i) decrypted image of (h); (j) 4.2.04.tiff; (k) cipher image of (j); (l) decrypted image of (k); (m) f15.png; (n) cipher image of (m); (o) decrypted image of (n); (p) f15.png; (q) cipher image of (p); (r) decrypted image of (q); (s) f15.png; (t) cipher image of (s); (u) decrypted image of (t); (v) f15.png; (w) cipher image of (v); (x) decrypted image of (w).
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)