Research Article
Efficient Encryption System for Numerical Image Safe Transmission
Figure 5
Key sensitivity test applied on the initial key: (a) encrypted Lena by key , (b) encrypted Lena by key , (c) difference between (a) and (b), (d) decrypted (a) by key , (e) decrypted (b) by key , and (f) difference between (d) and (e).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |