Skip to main content
. 2018 Apr 13;20(4):282. doi: 10.3390/e20040282

Figure 8.

Figure 8

The key sensitivity test: (a,e): the original image and corresponding histogram; (b,f): the encrypted image E1 with the security key set key(1) and corresponding histogram; (c,g): the encrypted image E2 with the security key set key(2) and corresponding histogram; (d,h): the pixel-by-pixel difference |E1E2| and corresponding histogram; (i): the decrypted image from E1 using the correct security key set key(1) ; (j): the decrypted image from E2 using an incorrect security key set key(1).