173931.fig.008a
(a) Encrypted lena image
173931.fig.008b
(b) Encrypted black image
173931.fig.008c
(c) Encrypted baboon image
173931.fig.008d
(d) Encrypted checkerboard image
173931.fig.008e
(e) Image (a) decrypted
173931.fig.008f
(f) Image (b) decrypted
173931.fig.008g
(g) Image (c) decrypted
173931.fig.008h
(h) Image (d) decrypted
Figure 8: Encrypted images under cropping attack in center (cropping over 1/8 of the entire image area).