Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 7
Visualization for Reagan. (a) First encryption. (b) Second encryption. (c) Decrypt for the first time. (d) Decrypt for the second time.
| (a) |
| (b) |
| (c) |
| (d) |