Research Article

Image Encryption with Double Spiral Scans and Chaotic Maps

Figure 6

Encrypted images.
(a) Encrypted Lena
(b) Encrypted Fingerprint
(c) Encrypted Woman
(d) Encrypted Lake
(e) Encrypted Goldhill
(f) Encrypted ChestXray