Fig. 17

Noise attack analysis (a) encrypted image added with salt and pepper noise, (b) decrypted image of a, (c) encrypted image added with Gaussian noise, (d) decrypted image of c, (e) encrypted image added with speckle noise, (f) decrypted image of e.