Research Article
[Retracted] Computer Network Security Management of Data Encryption Technology
Figure 4
The image processing.
(a) The original image before Arnold transform encryption |
(b) The image after Arnold transform once |
(c) The image after Arnold transform twice |
(d) The image after Arnold transform eight times |
(e) The image after Arnold transform fifteen times |
(f) Decrypted image |