Research Article
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service
Figure 2
The histogram of the original and encrypted image.
(a) The original image |
(b) Histogram of the original image |
(c) The encrypted image (partly) |
(d) Histogram of the encrypted image |