Table 1 Encoding rules of DNA.
From: Securing face images in UAV networks using chaos and DNA cryptography approach
Rules | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
C | 00 | 11 | 00 | 11 | 10 | 10 | 01 | 01 |
G | 11 | 00 | 11 | 00 | 01 | 01 | 10 | 10 |
T | 10 | 10 | 01 | 01 | 00 | 11 | 00 | 11 |
A | 01 | 01 | 10 | 10 | 11 | 00 | 11 | 00 |
From: Securing face images in UAV networks using chaos and DNA cryptography approach
Rules | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
C | 00 | 11 | 00 | 11 | 10 | 10 | 01 | 01 |
G | 11 | 00 | 11 | 00 | 01 | 01 | 10 | 10 |
T | 10 | 10 | 01 | 01 | 00 | 11 | 00 | 11 |
A | 01 | 01 | 10 | 10 | 11 | 00 | 11 | 00 |