Table 10 Original and encrypted images with their histograms.
From: A study of text-theoretical approach to S-box construction with image encryption applications

From: A study of text-theoretical approach to S-box construction with image encryption applications
