Research Article
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service
Figure 2
The histogram of the original and encrypted image.
| (a) The original image |
| (b) Histogram of the original image |
| (c) The encrypted image (partly) |
| (d) Histogram of the encrypted image |