Page 25 - 2024-Vol20-Issue2
P. 25

21 |  Yousif, Hameed & Al-Zuhairi

                               (a) (b) (c) (d)

                              (e) (f) (g) (h)

                                                                 (i) (j)
Fig. 10. Results of Cropping Attack on Peppers Ciphered and Deciphered Images (a) Cropping ½. (b) Cropping ¼ in the
Bottom Right Corner. (c) Cropping ¼ in the Top Left Corner (d) Cropping ¼ in the Center Part. (e) Cropping 1/8 in the Top
Left Corner of the Encrypted Image (f) Restored Image of (a) (g) Restored Image of (b) (h) Restored Image of (c) (i) Restored
Image of (d) (j) Restored Image of (e)
   20   21   22   23   24   25   26   27   28   29   30