Research Article
DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks
Figure 19
The simulation results for (a) original image, (b) stegoimage, (c) encrypted image, and (d) decrypted image for the sixth proposed technique.
(a) |
(b) |
(c) |
(d) |