Fig. 11

Results of decryption of the images (a–e) using correct key, and (f–j) using key with one bit change from the original key.

Results of decryption of the images (a–e) using correct key, and (f–j) using key with one bit change from the original key.