Research Article
Medical Image Encryption and Compression Scheme Using Compressive Sensing and Pixel Swapping Based Permutation Approach
Table 2
Differences between cipher images produced by slightly different keys.
| Figures | Encryption keys | Differences with Figure 6(b) | | | | |
| Figure 6(b) | 5.782595812953629 | 0.236925687412914 | 3.999345672564248 | 0.256799133578126 | ā | Figure 6(c) | 5.782595812953630 | 0.236925687412914 | 3.999345672564248 | 0.256799133578126 | 99.5941% | Figure 6(e) | 5.782595812953629 | 0.236925687412915 | 3.999345672564248 | 0.256799133578126 | 99.5934% | Figure 6(g) | 5.782595812953629 | 0.236925687412914 | 3.999345672564249 | 0.256799133578126 | 99.6147% | Figure 6(i) | 5.782595812953629 | 0.236925687412914 | 3.999345672564248 | 0.256799133578127 | 99.6124% |
|
|