Table 7 Comparison of key space.

From: Securing face images in UAV networks using chaos and DNA cryptography approach

Proposed scheme

39

40

41

42

\(\:{2}^{1024}\)

\(\:{2}^{372}\)

\(\:{2}^{1658}\)

\(\:{2}^{554}\)

\(\:{2}^{604}\)