Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Figure 1 16: Decrypted the Image. Step3: To decrypt the Image, we simply take the encrypted Image using a chaotic algorithm. This yields the original Image, as shown in figure (1.16).