Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Figure 1

General framework of image encryption. (a) Encryption process at sender side. (b) Decryption process at receiver side.
(a)
(b)