Page 183 - 2024-Vol20-Issue2
P. 183

179 |                                                            Muttashar & Fyath

                                                                 Fig. 25. Training progress of the DnCNN.

Fig. 23. Experimental results of the cropping attack: first row
shows (a-d) cropped images and the remaining rows show
corresponding decrypted images.

Fig. 24. Key sensitivity. (a) Decrypted Lena image with the      Fig. 26. Original, noisy, and denoised image for s =5
correct key, (b) Decrypted image using C1(0) = 0.01 + 10-17,
(c) Decrypted image using C2(0) = 0 + 10-17, (d) Decrypted
image using C3(0) = 0.01 + 10-17 (e) Decrypted baboon
image with correct key (f)-(h) the same incorrect key that

used in Lena image.
   178   179   180   181   182   183   184   185   186   187   188