Figure 13

Cropping Attack (CA) analysis (a) decrypted image of (e, b) decrypted image of (f, c) decrypted image of (g, d) decrypted image of (h, e) 1/16 CA, (f) 1/8 CA, (g) 1/4 CA, (h) 1/2 CA.
Cropping Attack (CA) analysis (a) decrypted image of (e, b) decrypted image of (f, c) decrypted image of (g, d) decrypted image of (h, e) 1/16 CA, (f) 1/8 CA, (g) 1/4 CA, (h) 1/2 CA.