Fig. 7

Key Sensitivity. (a) Plain image. (b) Cipher Image “\(\:{c}_{1}\)” using \(\:{Key}_{1}\). (c) Cipher Image “\(\:{c}_{2}\)” using \(\:{Key}_{2}\). (d) Decrypted Image c1 using the modified \(\:{Key}_{2}\). (f) Decrypted Image \(\:{c}_{1}\)using the original \(\:{Key}_{1}\).