Fig. 7

Simulation results. The cyphertext image at a \(E = 0\), b \(-500\) V cm\(^{-1}\), c \(-1000\) Vcm\(^{-1}\), d \(-1500\) Vcm\(^{-1}\) and e \(-2000\) Vcm\(^{-1}\), and f–j, the corresponding decrypted image when all the keys are correct
Simulation results. The cyphertext image at a \(E = 0\), b \(-500\) V cm\(^{-1}\), c \(-1000\) Vcm\(^{-1}\), d \(-1500\) Vcm\(^{-1}\) and e \(-2000\) Vcm\(^{-1}\), and f–j, the corresponding decrypted image when all the keys are correct