Research Article

A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map

Figure 6

Original image and the encrypted images using two rounds of encryption: (a) Pepper and (b) Baboon.
(a)
(b)