Research Article

An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map

Figure 2

Process of logistic modulation.