Fig. 4
From: Secure data transmission through fractal-based cryptosystem: a Noor iteration approach

3-D chart of the encrypted message.
From: Secure data transmission through fractal-based cryptosystem: a Noor iteration approach
3-D chart of the encrypted message.