Research Article
Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme
Figure 8
Key sensitivity in the first case: (a) plain image; (b) cipher image (, , , and ); (c) cipher image (, , , and ); (d) differential image between (b) and (c); (e) cipher image (, , , and ); (f) differential image between (b) and (e); (g) cipher image (, , , and ); (h) differential image between (b) and (g); (i) cipher image (, , , and ); (j) differential image between (b) and (i).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |