Research Article

Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm

Figure 7

Key sensitivity analysis: (a) original image; (b) encrypted image using keys 1; (c) encrypted image using keys 2; (d) difference image of (b) and (c); (e) decrypted image using wrong keys 2; (f) decrypted image using correct key.
(a)
(b)
(c)
(d)
(e)
(f)