Research Article

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

Figure 9

Result of Lena image. (a) Original image. (b) Histogram of the original image. (c) PRESENT ciphered. (d) Histogram of PRESENT ciphered. (e) PRINCE ciphered. (f) Histogram of PRINCE ciphered.