Research Article

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

Figure 11

Results of attacks with cropping attack. (a) Encrypted image with (32 × 32) cropping size. (b) Decrypted image.
(a)
(b)