Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 3

Face contour of face images. (a) Barbara. (b) Girl. (c) Lena. (d) Reagan.
(a)
(b)
(c)
(d)