Skip to main content
. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660

Fig 12. Key sensitivity test II.

Fig 12

(a) Encrypted image of Lena with the secret key K1, (b) decrypted image with the secret key K2, (c) decrypted image with the secret key K1, (d) encrypted image of Lena with the secret key K2, (e) decrypted image with the secret key K1, (f) decrypted image with the secret K2.