Research Article

An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service

Figure 2

The histogram of the original and encrypted image.
(a) The original image
(b) Histogram of the original image
(c) The encrypted image (partly)
(d) Histogram of the encrypted image