Skip to main content
. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660

Fig 15. Test of image under cropping.

Fig 15

(a) Cropped cipher-mage by removing 25% of the encrypted image of Lena (Fig. 14(b)), (b) decrypted image of the cropped cipher-image (a), (c) cropped cipher-mage by removing 50% of the encrypted image of Lena (Fig. 14(b)), (d) decrypted image of the cropped cipher-image (c).