Research Article
An Unequal Image Privacy Protection Method Based on Saliency Detection
Figure 5
Histogram analysis. (a) Original image of eagle. (b) Significant regions of eagle. (c) Cipher image. (d) Histogram of eagle. (e) Histogram of significant regions. (f) Histogram of cipher block corresponding to significant regions.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |