Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2019
/
Article
/
Fig 6
/
Research Article
Image Encryption with Double Spiral Scans and Chaotic Maps
Figure 6
Encrypted images.
(a)
Encrypted Lena
(b)
Encrypted Fingerprint
(c)
Encrypted Woman
(d)
Encrypted Lake
(e)
Encrypted Goldhill
(f)
Encrypted ChestXray