Academia.eduAcademia.edu

Figure 1.16: Decrypted the Image.  Step3: To decrypt the Image, we simply take the encrypted Image using a chaotic algorithm. This yields the original Image, as shown in figure (1.16).

Figure 1 16: Decrypted the Image. Step3: To decrypt the Image, we simply take the encrypted Image using a chaotic algorithm. This yields the original Image, as shown in figure (1.16).