Fig. 16

Cropping attack analysis (a)encrypted image cropped with 10%, (b) decrypted image of a, (c)encrypted image cropped with 25%, (d) decrypted image of c, (e)encrypted image cropped with 50%, (f) decrypted image of e.
Cropping attack analysis (a)encrypted image cropped with 10%, (b) decrypted image of a, (c)encrypted image cropped with 25%, (d) decrypted image of c, (e)encrypted image cropped with 50%, (f) decrypted image of e.