Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 10
Histogram analysis. (a) Histogram analysis of Lena. (b) Histogram analysis of encrypted Lena. (c) Histogram analysis of Reagan. (d) Histogram analysis of encrypted Reagan.
(a) |
(b) |
(c) |
(d) |