Research Article
A Chaos-Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps
Figure 3
Histograms of plain and encrypted images. (a) the plain images; (b) the histograms of plain images; (c) the encrypted images; (d) the histograms of encrypted images.
(a) |
(b) |
(c) |
(d) |