Figure 5

The test of occlusion attack: (a) the occluded encrypted image; (b) the recovered image; (c) the second occluded encrypted image and (d) the retrieved image of (c).

The test of occlusion attack: (a) the occluded encrypted image; (b) the recovered image; (c) the second occluded encrypted image and (d) the retrieved image of (c).