Research Article

[Retracted] Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System

Figure 12

Results of different size of data loss attack: (a) 1/16 occlusion; (b) decrypted image with 1/16; (c) 1/8 occlusion; (d) decrypted image with 1/8; (e) 1/4 occlusion; (f) decrypted image with 1/4; (g) 1/2 occlusion; (h) decrypted image with 1/2.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)