*4.1. Simulation Results*

To verify the feasibility of the encryption algorithm proposed in this paper, some pictures were used for testing. Figure 7 shows the original images in the first column, the encrypted images in the second column, and the decrypted images in the last column.

**Figure 7.** *Cont.*

177

**Figure 7.** Simulation results of the proposed image encryption algorithm: (**a**,**d**) original images, (**b**,**e**) encrypted images, and (**c**,**f**) decrypted images.
