Review Article
Computational Image Encryption Techniques: A Comprehensive Review
Table 3
Comparison among various elliptic curve-based image encryption approaches.
| Ref. | Technique | HA | KA | IE | NA | NPCR | UACI | CA | PSNR | MSE |
| [41] | Elliptic curve cryptography | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [42] | Elliptic with EIGamal encryption | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | [43] | Elliptic curve with Mersenne Twister | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | [39] | Elliptic curve and AES | ✓ | ✓ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | [45] | DNA with elliptic curve | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | [40] | Elliptic curve EIGamal encryption | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | [46] | Elliptic curve with ECC | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | [47] | Elliptic curve over finite field | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | [48] | Elliptic with Hill cipher | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | [49] | Menezes–Vanstone elliptic curve | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
|
|