Research Article
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Figure 10
Histogram plots (a) of an input tree and (b) input image of a baboon; (c, d) encrypted images of tree and baboon.
(a) |
(b) |
(c) |
(d) |