Research Article

Protecting Private Data by Honey Encryption

Figure 6

Time to encrypt/decrypt a message.
(a) Encryption time
(b) Decryption time