Introduction - If you have any usage issues, please Google them yourself
Simple image encryption procedures, the Original and different pictures as a key to achieve the image or operation of encryption, and then once exclusive or operation, to achieve decryption