Figure 15
From: An image encryption scheme based on public key cryptosystem and quantum logistic map

Tree image crop attack: (a) crop four small squares; (b) crop the middle part; (c) crop the upper left corner; (d) decryption of image (a); (e) decryption of image (b); (f) decryption of image (c).