Research Article

Color Image Encryption Based on Deep Learning and Block Embedding

Figure 7

Cropping attack analysis diagram. Image (a) is color house image, (b) is a result map of 25% clipping of the encrypted map (a), (c) is a decryption map of (b), (d) is a result map of 50% clipping of the encrypted map (a), and (e) is a decryption map of (d). Image (f) is color monkey original image, (g) is a result image of 25% cutting of the encrypted image (f), (h) is a decryption image of (g), (i) is a result image of 50% cutting of the encrypted image (f), and (j) is a decryption image of (i). The image (k) is color map image, (l) is a result map of 25% cropping of the encrypted map (k), (m) is a decryption map of (l), (n) is a result map of 50% cropping of the encrypted map (k), and (o) is a decryption map of (n).