Research Article
Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves
Figure 7
Original image, encrypted image, and image decrypted with the wrong key (based on the proposed method).
(a) Original image |
(b) Image encrypted using the proposed method |
(c) Image decrypted with wrong key |