Figure 3. The model of proposed encrypt method.
All published articles are preserved here permanently: