Research Article

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment

Figure 12

Data loss attack, with the first row denoting the defective cipher images by cutting out some parts and the last row signifying the corresponding deciphered ones. (a) Cutting out 10%. (b) Cutting out 15%. (c) Cutting out 25%.
(a)
(b)
(c)