Fig. 11

(a) Original image, (b) Encrypted image using original key, (c) Encrypted image using varied key, (d) Difference between b and c.
(a) Original image, (b) Encrypted image using original key, (c) Encrypted image using varied key, (d) Difference between b and c.