Fig. 11

(a)original image, (b) key image, (c) zig-zag scrambled image, (d)confused image, (e) encrypted image (f) decrypted image (g) original image histogram, (h) key image histogram, (i) zig-zag scrambled image histogram, (j) confused image histogram, (k) encrypted image histogram, and (l) decrypted image histogram.