Research Article

Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition

Figure 5

The key sensitivity test. (a) Plain image (512 × 512). (b) Host image. (c) Visual image. (d) Visual image with the change key. (e) Difference image estimated as the difference of images in (d)-(c). (f) Decrypted image (c) use of the keys of (d). (g) Decrypted image (d) using the keys of (c). (h) Decrypted image with the correct key.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)