Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Fig 8
/
Research Article
Image Encryption with Fusion of Two Maps
Figure 8
Visual examples: (a), (d), (g) (j) plain images; (b), (e), (h), (k) encrypted images; (c), (f), (i), (l) decrypted images.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)