Research Article

An Image Encryption Scheme Based on DNA Computing and Cellular Automata

Table 7

Comparison with the simulation algorithms.

ā€‰Key spaceKey sensitivityStatistical attackDifferential attack

Reference [2]SmallYesYesNo
Reference [7]SmallYesYesNo
Reference [12]SmallYesYesWeak
Reference [13]SmallYesYesWeak
Reference [14]SmallYesYesWeak
OursLargeYesYesStrong