Research Article
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Figure 10
(a) Input image, (b) input histogram, (c) encrypted image histogram, and (d) output image and histogram.
(a) |