Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 4
Visualization for Barbara. (a) First encryption. (b) Second encryption. (c) Decrypt for the first time. (d) Decrypt for the second time.
(a) |
(b) |
(c) |
(d) |