Research Article

An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map

Figure 4

Comparative experiment of “Camera man”: (a) original image, (b) 2D-SLMM, (c) SBE-LBP, (d) BPE-XOR, and (e) method of using 2D-SLMM to modulate original image. The second row shows their corresponding histograms and the third row shows their corresponding autocorrelation images.