Skip to main content
. 2018 Jun 14;20(6):463. doi: 10.3390/e20060463

Figure 10.

Figure 10

The results of the chosen plain image attack. (a) black image; (b) encrypted black image; (c) encrypted original image; (d) decryption of encrypted black image with possible key.