Research Article

[Retracted] Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion

Figure 10

Key sensitivity analysis of . (a), (e), (l), and (o) original images, (b), (f), (m), and (p) cipher images , (c), (g), (i), and (q) cipher images , and (d), (h), (n), and (r) images of .
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)