Table 3 Analysis of entropy in proposed and existing models.
From: A dynamic image encryption scheme through 2-D cellular automata and chaotic logistic map
Methods | Airplane | Baboon | House | House1 | Peppers |
|---|---|---|---|---|---|
Ref.21 | 7.9932 | 7.9975 | 7.9950 | 7.9898 | 7.9893 |
Ref.17 | 7.9962 | 7.9943 | 7.9939 | 7.9878 | 7.9886 |
Ref.14 | 7.9894 | 7.9982 | 7.9893 | 7.9897 | 7.9562 |
Ref.18 | 7.9975 | 7.9982 | 7.9986 | 7.9964 | 7.9969 |
Ref.43 | 7.4032 | 7.3873 | 7.3993 | 7.5971 | 7.6823 |
Ref.23 | 7.9972 | 7.9975 | 7.9976 | 7.9982 | 7.9983 |
Ref.44 | 7.9974 | 7.9973 | 7.9969 | 7.9951 | 7.9973 |
Ref.45 | 7.9973 | 7.9968 | 7.9971 | 7.9968 | 7.9974 |
Ref.46 | 7.9975 | 7.9967 | 7.9973 | 7.9971 | 7.9985 |
Ref.47 | 7.9769 | 7.9787 | 7.9768 | 7.9750 | 7.9765 |
Proposed | 7.9986 | 7.9991 | 7.9989 | 7.9993 | 7.9990 |