Research Article

A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups

Figure 2

Original image and the encrypted images using two rounds of encryption: (a) Pepper and (b) Baboon.
(a)
(b)