Research Article

Securing E-Healthcare Images Using an Efficient Image Encryption Model

Figure 3

Visual analysis. (a) Plain medical images. (b) Histograms of plain images. (c) Encrypted medical images. (d) Histograms of encrypted images. (e) Decrypted images.
(a)
(b)
(c)
(d)
(e)