Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Figure 4

Working of chaotic map-based image encryption.