Research Article
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos
Figure 14
Encryption process: (a) original photograph, (b) image with coded faces, and (c) image with decoded faces. (a) Original photograph used for testing proposed algorithm in this paper; (b) photograph used for testing with embedded cryptograms from proposed algorithm; and (c) Photograph recovered with proposed algorithm.
(a) |
(b) |
(c) |