Skip to main content
. 2016 Mar 8;5:289. doi: 10.1186/s40064-016-1959-1

Fig. 8.

Fig. 8

Histogram of the images a Plain image, b Ciphered image