Skip to main content
. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660

Fig 1. Flowchart of the proposed image encryption algorithm.

Fig 1