Fig. 10

Key sensitivity analysis: (a) Original Image, (b) Deciphered Image with wrong key set K1’, (c) Deciphered Image with wrong key set K2’, (d) Deciphered Image with wrong key set K3’, (e) Deciphered Image with wrong key set K4’, (f) Deciphered Image with Correct key set.