Research Article

Image Encryption with Fusion of Two Maps

Figure 8

Visual examples: (a), (d), (g) (j) plain images; (b), (e), (h), (k) encrypted images; (c), (f), (i), (l) decrypted images.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)