Research Article
A New Image Encryption Scheme Based on Hybrid Chaotic Maps
Figure 12
The simulation steps: (a) LL component; (b) LH component; (c) HL component; (d) HH component; (e) LL component confusion; (f) LH component confusion; (g) HL component confusion; (h) HH component confusion; (i) original image; (j) overall confusion; (k) encrypted image; and (l) decrypted image.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |
| (i) |
| (j) |
| (k) |
| (l) |