Research Article
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm
Figure 7
Key sensitivity analysis: (a) original image; (b) encrypted image using keys 1; (c) encrypted image using keys 2; (d) difference image of (b) and (c); (e) decrypted image using wrong keys 2; (f) decrypted image using correct key.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |