Research Article
Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves
Figure 2
Original image, encrypted image, and image decrypted with the wrong key.
(a) Original image |
(b) Encrypted image |
(c) Image decrypted with wrong key |