Research Article

A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications

Figure 4

(a) Input sample images. (b) Encrypted images. (c) Decrypted images.
(a)
(b)
(c)