Research Article

A Secure Image Encryption Algorithm Based on Rubik's Cube Principle

Figure 8

Encrypted images under cropping attack in center (cropping over 1/8 of the entire image area).
173931.fig.008a
(a) Encrypted lena image
173931.fig.008b
(b) Encrypted black image
173931.fig.008c
(c) Encrypted baboon image
173931.fig.008d
(d) Encrypted checkerboard image
173931.fig.008e
(e) Image (a) decrypted
173931.fig.008f
(f) Image (b) decrypted
173931.fig.008g
(g) Image (c) decrypted
173931.fig.008h
(h) Image (d) decrypted