Fig. 11

Cropping attack analysis: (a) 10% cropped cipher image (81 × 81), (b) 30% cropped cipher image (140 × 140), (c) 50% cropped cipher image (181 × 181), (d) Cropped cipher image of size 64 × 64, (e) Cropped cipher image 32 × 32, (f) Deciphered image of (a), (g) Deciphered image of (b), (h) Deciphered image of (c), (i) Deciphered image of (d), (j) Deciphered image of (e).