@MK27
I think I understand what you mean now, and your method does seem to be more secure.
For example; If you had access to parts of the output stream from a PRNG like rand() and knew the exact implementation you could theroretically deduce what the seed was, and therefore get the rest of the keystream. But with your algorithm it would be impossible to figure out the entire key based on only having a part of it.