Research Article

An Image Encryption Scheme Based on DNA Computing and Cellular Automata

Table 3

Comparison of key spaces.

AlgorithmReference [2]Reference [7]Reference [12]Reference [13]Reference [14]Ours

Key space