Research Article

A Chaos-Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps

Figure 3

Histograms of plain and encrypted images. (a) the plain images; (b) the histograms of plain images; (c) the encrypted images; (d) the histograms of encrypted images.
(a)
(b)
(c)
(d)