Research Article
Reversible Information Hiding Algorithm Based on Multikey Encryption
Figure 6
Histogram comparison between the original image and encrypted image. (a, e) are histogram comparison of Lena. (b, f) are histogram comparison of Baboon. (c, g) are histogram comparison of Barbara. (d, h) are histogram comparison of Goldhill.
(a) Lena |
(b) Baboon |
(c) Barbara |
(d) Goldhill |
(e) Lena |
(f) Baboon |
(g) Barbara |
(h) Goldhill |