Research Article

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

Figure 10

Result of Pepper image. (a) Original image. (b) Histogram of the original image. (c) PRESENT ciphered. (d) Histogram of PRESENT ciphered. (e) PRINCE ciphered. (f) Histogram of PRINCE ciphered.