Research Article

System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos

Table 5

Original faces, cryptograms, and decrypted faces.

Description(a)(b)(c)(d)

Original faces
Cryptograms
Decrypted faces

Column (a): original face (a) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (a) from Table 5; and recovered data by proposed algorithm of original (a) from Table 5.
Column (b): original face (b) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (b) from Table 5; and recovered data by proposed algorithm of original (b) from Table 5.
Column (c): original face (c) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (c) from Table 5; and recovered data by proposed algorithm of original (c) from Table 5.
Column (d): original face (d) subtracted by face detection from Figure 14(a); cryptogram generated by proposed algorithm of original (d) from Table 5; and recovered data by proposed algorithm of original (d) from Table 5.