Research Article

An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map

Figure 1

Encryption and decryption process.