Research Article
A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process
Figure 6
Histogram analysis plain and cipher images using the secret key «A23C56789ABADEF7167DEAB6789367A9»: (a), (b), (c), and (d) A plain image “Balantidium Coli cyst” and its corresponding histogram, cipher image, and cipher image histogram, respectively. (e), (f), (g), and (h) A plain image “echopelv» and its corresponding histogram, cipher image, and cipher image histogram, respectively. (i), (j), (k), and (l) A plain image “Girl (Lena, 4.2.04)» and its corresponding histogram, cipher image, and cipher image histogram, respectively. (m), (n), (o), and (p) A plain image “Guefack» and its corresponding histogram, cipher image, and cipher image histogram, respectively.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |