Skip to main content
. 2018 Sep 19;20(9):716. doi: 10.3390/e20090716

Figure 6.

Figure 6

The image decrypted by the wrong keys. (a) decryption result of key Key1; (b) decryption result of Key2; (c) decryption result of Key3; (d) decryption result of Key4.