Research Article

System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos

Figure 14

Encryption process: (a) original photograph, (b) image with coded faces, and (c) image with decoded faces. (a) Original photograph used for testing proposed algorithm in this paper; (b) photograph used for testing with embedded cryptograms from proposed algorithm; and (c) Photograph recovered with proposed algorithm.
(a)
(b)
(c)