Skip to main content
. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660

Fig 11. Key sensitivity test I.

Fig 11

(a) Original image of Lena, (b) encrypted image of Lena with the secret key K1, (c) encrypted image of Lena with the secret key K2, (d) difference image.