Fig. 10
From: Securing face images in UAV networks using chaos and DNA cryptography approach

Cropped encrypted images and their resulting decrypted images.
From: Securing face images in UAV networks using chaos and DNA cryptography approach

Cropped encrypted images and their resulting decrypted images.