Skip to main content
. 2016 Mar 8;5:289. doi: 10.1186/s40064-016-1959-1

Fig. 9.

Fig. 9

Key sensitivity analysis. a decrypted image with x 0 be different with 10−14 b decrypted image with u 0 be different with 10−14 c decrypted image with a 1 be different with 10−14 d decrypted image by randomly exchanging two codes in the initial code book