Research Article
[Retracted] Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion
Figure 10
Key sensitivity analysis of . (a), (e), (l), and (o) original images, (b), (f), (m), and (p) cipher images , (c), (g), (i), and (q) cipher images , and (d), (h), (n), and (r) images of .
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |