Fig. 3
From: Securing face images in UAV networks using chaos and DNA cryptography approach

Workflow diagram of encryption process.
From: Securing face images in UAV networks using chaos and DNA cryptography approach

Workflow diagram of encryption process.