Research Article
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos
Table 5
Original faces, cryptograms, and decrypted faces.
| |||||||||||||||||||||||||||||||||||
Column (a): original face (a) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (a) from Table 5; and recovered data by proposed algorithm of original (a) from Table 5. Column (b): original face (b) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (b) from Table 5; and recovered data by proposed algorithm of original (b) from Table 5. Column (c): original face (c) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (c) from Table 5; and recovered data by proposed algorithm of original (c) from Table 5. Column (d): original face (d) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (d) from Table 5; and recovered data by proposed algorithm of original (d) from Table 5. |