Research Article
Securing E-Healthcare Images Using an Efficient Image Encryption Model
Figure 3
Visual analysis. (a) Plain medical images. (b) Histograms of plain images. (c) Encrypted medical images. (d) Histograms of encrypted images. (e) Decrypted images.
(a) |
(b) |
(c) |
(d) |
(e) |