Research Article

Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves

Figure 7

Original image, encrypted image, and image decrypted with the wrong key (based on the proposed method).
(a) Original image
(b) Image encrypted using the proposed method
(c) Image decrypted with wrong key