Page 183 - 2024-Vol20-Issue2
P. 183
179 | Muttashar & Fyath
Fig. 25. Training progress of the DnCNN.
Fig. 23. Experimental results of the cropping attack: first row
shows (a-d) cropped images and the remaining rows show
corresponding decrypted images.
Fig. 24. Key sensitivity. (a) Decrypted Lena image with the Fig. 26. Original, noisy, and denoised image for s =5
correct key, (b) Decrypted image using C1(0) = 0.01 + 10-17,
(c) Decrypted image using C2(0) = 0 + 10-17, (d) Decrypted
image using C3(0) = 0.01 + 10-17 (e) Decrypted baboon
image with correct key (f)-(h) the same incorrect key that
used in Lena image.