Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 1

Image encryption evaluation parameters.

Evaluation parameterAbbr.Expectation

Key space analysis [3]KALarge key size (more than )
Histogram analysis [1]HAPixels should uniformly distribute
Information entropy [10]IEEqual to 8, for a 256-gray level image
Noise attack [11]NAOught to be safe to noise attacks
Correlation coefficient [12]CCNear to 0
Mean squared error [13]MSEMinimum
Peak signal-to-noise ratio [2, 14]PSNRLow between encrypted and actual images; high between the ciphered and decrypted images
Execution time [2]ETMinimum for practical implementation
Number of pixel change rate [15]NPCRMaximum value (according to critical analysis, it should be near to 99.609% or more)
Unified average changing intensity [16]UACIMinimum value (according to critical analysis, it should be near to 33.464% or more)