Skip to main content
. 2018 Jul 18;20(7):535. doi: 10.3390/e20070535

Figure 6.

Figure 6

Key sensitivity tests: (a,e): plain-image and its histogram; (b,f): E1 and its histogram; (c,g): E2 and its histograms; (d,h): |E1E2| and its histogram; (i): decrypted image of E1 using key set key(1) ; (jn): decrypted image of E1 using security key set key(2), key(3), key(4), key(5) or key(6).