Research Article

A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications

Figure 10

(a) Input image, (b) input histogram, (c) encrypted image histogram, and (d) output image and histogram.
(a)