Fig. 9

Chosen plain text attack analysis: (a) Full black image, (b) encrypted black image, (c) Histogram of (b), (d) Full white image, (e) encrypted white image, (f) Histogram of (e).

Chosen plain text attack analysis: (a) Full black image, (b) encrypted black image, (c) Histogram of (b), (d) Full white image, (e) encrypted white image, (f) Histogram of (e).