Research Article
A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
Figure 7
Encryption and decryption effects for different types of images: (a) f15.png; (b) cipher image of (a); (c) decrypted image of (b); (d) 5.2.09.tiff; (e) cipher image of (d); (f) decrypted image of (e); (g) gray21.512.tiff; (h) cipher image of (g); (i) decrypted image of (h); (j) 4.2.04.tiff; (k) cipher image of (j); (l) decrypted image of (k); (m) f15.png; (n) cipher image of (m); (o) decrypted image of (n); (p) f15.png; (q) cipher image of (p); (r) decrypted image of (q); (s) f15.png; (t) cipher image of (s); (u) decrypted image of (t); (v) f15.png; (w) cipher image of (v); (x) decrypted image of (w).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |