Research Article
Analysis of Communication Compression and Transmission in a Multimedia and Internet of Things Environment Integrating Scene Elements
Figure 3
Comparison of the relevance of encryption methods. (a) The original image block. (b) Encrypted image block. (c) Mod 256 encryption image block. (d) The original image block D-value. (e) Encrypted image block D-value. (f) Mod 256 encryption image block D-value.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |