Skip to main content
. 2020 Sep 10;20(18):5162. doi: 10.3390/s20185162

Figure 2.

Figure 2

Flow chart for image encryption and decryption.