Fig. 8From: Even symmetric chaotic and skewed maps as a technique in video encryptionA The rotational attack of original I-frame, b The magnitude spectrum of original I-frame. C The magnitude spectrum of encrypted rotational I-frame d Encrypted the rotational I-frame original I-frameBack to article page