Research Article

Securing E-Healthcare Images Using an Efficient Image Encryption Model

Figure 2

Chaotic attractors of SHM: (a) plane, (b) plane, and (c) plane.
(a)
(b)
(c)