Research Article

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

Figure 12

Results of attacks with cropping attack. (a) Encrypted image with (64 × 64) cropping size. (b) Decrypted image.
(a)
(b)