Research Article

An Image Encryption Scheme Based on DNA Computing and Cellular Automata

Figure 6

Experimental results of the wrong Key.
(a)
(b)
(c)