Research Article
[Retracted] Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System
Figure 12
Results of different size of data loss attack: (a) 1/16 occlusion; (b) decrypted image with 1/16; (c) 1/8 occlusion; (d) decrypted image with 1/8; (e) 1/4 occlusion; (f) decrypted image with 1/4; (g) 1/2 occlusion; (h) decrypted image with 1/2.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |