Research Article

Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme

Figure 3

The results of the proposed chosen-plaintext attack: (a) plain image; (b) cipher image; (c) retrieved substitution key stream elements; (d) the recovered image.
(a)
(b)
(c)
(d)