Skip to main content
. 2021 Nov 29;16(11):e0260014. doi: 10.1371/journal.pone.0260014

Fig 12. Encrypted and decrypted image after changing the key.

Fig 12

(a) encrypted image, (b) decrypted image.