Research Article
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Figure 7
Histogram analysis: (a, d, g) the histograms of plain images 5.1.11.tiff, 5.1.12.tiff, and 5.1.13.tiff; (b, e, h) the histograms of the respective encrypted results; (c, f, i) the histograms of the respective recovered images.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |
| (i) |