Figure 8: The proposed encryption method.