Research Article
An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map
Figure 3
Simulation of proposed method: (a) the original image, (b) 2D-SLMM, (c) 1st round XOR encrypted image, (d) 2nd round XOR encrypted image, and (e) decrypted image. The second row shows their corresponding autocorrelation images and the third row shows their corresponding histograms.