Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 4

Visualization for Barbara. (a) First encryption. (b) Second encryption. (c) Decrypt for the first time. (d) Decrypt for the second time.
(a)
(b)
(c)
(d)