Research Article
An Image Encryption Scheme Based on DNA Computing and Cellular Automata
Table 7
Comparison with the simulation algorithms.
| ā | Key space | Key sensitivity | Statistical attack | Differential attack |
| Reference [2] | Small | Yes | Yes | No | Reference [7] | Small | Yes | Yes | No | Reference [12] | Small | Yes | Yes | Weak | Reference [13] | Small | Yes | Yes | Weak | Reference [14] | Small | Yes | Yes | Weak | Ours | Large | Yes | Yes | Strong |
|
|