Research Article

Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme

Figure 8

Key sensitivity in the first case: (a) plain image; (b) cipher image (, , , and ); (c) cipher image (, , , and ); (d) differential image between (b) and (c); (e) cipher image (, , , and ); (f) differential image between (b) and (e); (g) cipher image (, , , and ); (h) differential image between (b) and (g); (i) cipher image (, , , and ); (j) differential image between (b) and (i).
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)