Skip to main content
. 2018 Nov 3;20(11):843. doi: 10.3390/e20110843

Figure 10.

Figure 10

Data loss and noise attack. (a) The original cipher image; (b) the cipher images with data loss; (c) the cipher image added with 3% “salt & pepper” noise; (d) the decrypted image of (a); (e) the decrypted image of (b); (f) the decrypted image of (c).