Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 2

Comparison of various chaotic-based image encryption approaches.

Ref.TechniqueHAKAIENANPCRUACICC

[19]Logistic map
[20]DNA and chaotic system
[21]Chaotic-based DNA
[22]Edge detection and chaotic map
[23]6D hyperchaotic
[24]Hyperchaotic system
[25]Hyperchaotic with quantum coding
[26]PWLCM system
[27]Standard memristive chaotic system
[28]Semitensor product theory
[30]3D bit-plane permutation
[32]Chaotic map
[33]Block level diffusion operation
[34]Coupled map lattices
[35]Mixed memristive chaotic circuit
[36]Chaotic map
[37]Edge maps
[38]Bit level Brownian motion