Research Article
An Image Encryption Scheme Based on DNA Computing and Cellular Automata
Table 8
Comparison with the biotic experimental algorithms.
| ā | Text | Image | Bioexperiment | Internet transfer |
| Reference [16] | Yes | Yes | Yes | No | Reference [17] | Yes | No | Yes | No | Reference [18] | Yes | No | Yes | No | Reference [19] | Yes | No | Yes | No | Reference [20] | Yes | No | Yes | No | Reference [21] | Yes | No | Yes | No | Reference [22] | Yes | No | No | Yes | Ours | Yes | Yes | No | Yes |
|
|