Research Article

Analysis of Communication Compression and Transmission in a Multimedia and Internet of Things Environment Integrating Scene Elements

Figure 3

Comparison of the relevance of encryption methods. (a) The original image block. (b) Encrypted image block. (c) Mod 256 encryption image block. (d) The original image block D-value. (e) Encrypted image block D-value. (f) Mod 256 encryption image block D-value.
(a)
(b)
(c)
(d)
(e)
(f)