Research Article
Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme
Figure 3
The results of the proposed chosen-plaintext attack: (a) plain image; (b) cipher image; (c) retrieved substitution key stream elements; (d) the recovered image.
(a) |
(b) |
(c) |
(d) |