Table 5 Evaluation of UACI across different models.
From: A dynamic image encryption scheme through 2-D cellular automata and chaotic logistic map
Methods | Airplane | Baboon | House | House1 | Peppers |
|---|---|---|---|---|---|
Ref.21 | 33.5288 | 33.8000 | 33.9025 | 32.8111 | 32.9625 |
Ref.17 | 36.8943 | 31.6839 | 35.2787 | 34.2432 | 37.3450 |
Ref.14 | 33.2783 | 31.0242 | 34.2738 | 33.0179 | 32.8146 |
Ref.18 | 35.8221 | 33.6823 | 35.4673 | 34.5789 | 33.6475 |
Ref.23 | 34.8199 | 34.9352 | 34.8597 | 34.8436 | 34.9678 |
Ref.44 | 33.5472 | 33.4521 | 33.5612 | 33.4936 | 33.6357 |
Ref.45 | 33.4708 | 33.5167 | 33.5008 | 33.4754 | 33.5672 |
Ref.46 | 33.3831 | 33.1598 | 33.3584 | 33.4858 | 33.2517 |
Ref.47 | 33.9385 | 33.1112 | 33.1394 | 33.0881 | 33.9003 |
Proposed | 38.0381 | 35.5442 | 38.2651 | 37.2258 | 36.6732 |