Research Article

A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process

Figure 6

Histogram analysis plain and cipher images using the secret key «A23C56789ABADEF7167DEAB6789367A9»: (a), (b), (c), and (d) A plain image “Balantidium Coli cyst” and its corresponding histogram, cipher image, and cipher image histogram, respectively. (e), (f), (g), and (h) A plain image “echopelv» and its corresponding histogram, cipher image, and cipher image histogram, respectively. (i), (j), (k), and (l) A plain image “Girl (Lena, 4.2.04)» and its corresponding histogram, cipher image, and cipher image histogram, respectively. (m), (n), (o), and (p) A plain image “Guefack» and its corresponding histogram, cipher image, and cipher image histogram, respectively.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)