Fig. 13

Occlusion attack—(a) Plain image P, (b) Cipher image Z using the proposed encryption algorithm and a key \(\mathcal {K}\), (c) 25% occlusion attack on Z to give \(Z'\), (d) Decrypted image D from \(Z'\) using the proposed decryption algorithm and the same key \(\mathcal {K}\).