173931.fig.002a
(a) Original image: Lena
173931.fig.002b
(b) Encrypted image (a) with key 𝐾 1
173931.fig.002c
(c) Encrypted image (a) with key 𝐾 2
173931.fig.002d
(d) Image difference between (b) and (c)
173931.fig.002e
(e) Original image: Black
173931.fig.002f
(f) Encrypted image (e) with key 𝐾 1
173931.fig.002g
(g) Encrypted image (e) with key 𝐾 2
173931.fig.002h
(h) Image: difference between (f) and (g)
173931.fig.002i
(i) Original image: Baboon
173931.fig.002j
(j) Encrypted image (i) with key 𝐾 1
173931.fig.002k
(k) Encrypted image (i) with key 𝐾 2
173931.fig.002l
(l) Image difference between (j) and (k)
173931.fig.002m
(m) Original image: Checkerboard
173931.fig.002n
(n) Encrypted image (m) with key 𝐾 1
173931.fig.002o
(o) Encrypted image (m) with key 𝐾 2
173931.fig.002p
(p) Image: difference between (n) and (o)
Figure 2: Key sensibility for image encryption using the proposed algorithm.