Research Article
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
Figure 10
Result of Pepper image. (a) Original image. (b) Histogram of the original image. (c) PRESENT ciphered. (d) Histogram of PRESENT ciphered. (e) PRINCE ciphered. (f) Histogram of PRINCE ciphered.