Research Article
Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme
Figure 9
Key sensitivity of the second case: (a) cipher image (, , , and ); (b) decipher image (, , , and ); (c) decipher image (, , , and ); (d) decipher image (, , , and ); (e) decipher image (, , , and ); (f) decipher image (, , , and ).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |