Research Article

Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme

Figure 9

Key sensitivity of the second case: (a) cipher image (, , , and ); (b) decipher image (, , , and ); (c) decipher image (, , , and ); (d) decipher image (, , , and ); (e) decipher image (, , , and ); (f) decipher image (, , , and ).
(a)
(b)
(c)
(d)
(e)
(f)