Research Article

Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves

Figure 2

Original image, encrypted image, and image decrypted with the wrong key.
(a) Original image
(b) Encrypted image
(c) Image decrypted with wrong key