Fig. 1From: A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptographyProcedure for the image restoration for the rotation attack a Original image, b after rotation attack, c after restoration and d after cropping and scalingBack to article page