Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Figure 5

Chaotic map and elliptic curve-based image encryption.