Fig. 2

(a) Original image, (b)initial diffusion using S1, (c) row shuffling using S2, (d) xor-ing row shuffled matrix with S2, (e) column shuffling using S3, (f) xor-ing column shuffled matrix with S3, (g) final encrypted image using a secondary image.