Figure 12

Noise attack (NA) analysis: (a) is decrypted image of (d, b) decrypted image of (e, c) decrypted image of (f, d) adding 0.01 salt and pepper noise, (e) adding 0.01 salt and pepper noise, (f) adding 0.01 salt and pepper noise.
Noise attack (NA) analysis: (a) is decrypted image of (d, b) decrypted image of (e, c) decrypted image of (f, d) adding 0.01 salt and pepper noise, (e) adding 0.01 salt and pepper noise, (f) adding 0.01 salt and pepper noise.