Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 10

Histogram analysis. (a) Histogram analysis of Lena. (b) Histogram analysis of encrypted Lena. (c) Histogram analysis of Reagan. (d) Histogram analysis of encrypted Reagan.
(a)
(b)
(c)
(d)