(a)
(b)
Figure 12: (a) Micrograph without attack, (b) attacked micrograph.