Research Article

Reversible Information Hiding Algorithm Based on Multikey Encryption

Figure 5

Experimental result on Lena and Goldhill when the block sized and 10 bits of additional information were embedded in each block. (a) is the original image of Lena; (b) is the encrypted image of Lena; (c) is the decrypted image of Lena. (d) is the original image of Goldhill; (e) is the encrypted image of Goldhill; (f) is the decrypted image of Goldhill. (g) is the original image of Barbara; (h) is the encrypted image of Barbara; (i) is the decrypted image of Barbara. (j) is the original image of Baboon; (k) is the encrypted image of Baboon; (l) is the decrypted image of Baboon.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)