method. It is based on a bit values transformation according to both a certain Boolean
function and a specific scheme of correspondence between MSB and LSB. The scheme of
correspondence is considered as a secret key. The proposed method should be used for
protection of large amounts of secret graphical data.