“…Figure 5 shows the decrypted results of Goldhill with a key minimally different from the right key. On specifics, the 16 cipher keys, ε 1 , ε 2 , ε 3 , ε 4 , θ 1 , θ 2 , θ 3 , θ 4 , s 1 , s 2 , s 3 , s 4 , t 1 , t 2 , t 3 and t 4 are changed, one at a time, from their correct values into ω 12 , ω 51 , ω 51 , ω 127 , ω 16 , ω 19 , ω 27 , ω 12 , 193, 49, 104, 182, 197, 43, 103 and 131. Taking Goldhill as an example, the resulting 16 decrypted images are shown in Fig.…”