Figure 13
From: High-quality restoration image encryption using DCT frequency-domain compression coding and chaos

The histograms of images before and after encryption (a) \(1^{\#}\)45 plain image; (b) the histogram of (a); (c) \(1^{\#}\) cipher image; (d) the histogram of (c); (e) \(2^{\#}\) plain image; (f) the histogram of (e); (g) \(2^{\#}\) cipher image; (h) the histogram of (g); (i) \(3^{\#}\) plain image; (j) the histogram of (i); (k) \(3^{\#}\)45 cipher image; (l) the histogram of (k); (m) \(4^{\#}\) plain image; (n) the histogram of (m); (o) \(4^{\#}\) cipher image; (p) the histogram of (o).