173931.fig.003a
(a) Original image: Lena
173931.fig.003b
(b) Encrypted image (a) with key 𝐾 1
173931.fig.003c
(c) Decrypted image (b) using correct key 𝐾 1
173931.fig.003d
(d) Decrypted image (b) using wrong key 𝐾 2
173931.fig.003e
(e) Original image: Black
173931.fig.003f
(f) Encrypted image (e) with key 𝐾 1
173931.fig.003g
(g) Decrypted image (f) using correct key 𝐾 1
173931.fig.003h
(h) Decrypted image (f) using wrong key 𝐾 2
173931.fig.003i
(i) Original image: Baboon
173931.fig.003j
(j) Encrypted image (i) with key 𝐾 1
173931.fig.003k
(k) Decrypted image (j) using correct key 𝐾 1
173931.fig.003l
(l) Decrypted image (j) using wrong key 𝐾 2
173931.fig.003m
(m) Original image: Checkerboard
173931.fig.003n
(n) Encrypted image (m) with key 𝐾 1
173931.fig.003o
(o) Decrypted image (n) using correct key 𝐾 1
173931.fig.003p
(p) Decrypted image (n) using wrong key 𝐾 2
Figure 3: Key sensibility for image decryption using the proposed algorithm.