Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 3

Comparison among various elliptic curve-based image encryption approaches.

Ref.TechniqueHAKAIENANPCRUACICAPSNRMSE

[41]Elliptic curve cryptography
[42]Elliptic with EIGamal encryption
[43]Elliptic curve with Mersenne Twister
[39]Elliptic curve and AES
[45]DNA with elliptic curve
[40]Elliptic curve EIGamal encryption
[46]Elliptic curve with ECC
[47]Elliptic curve over finite field
[48]Elliptic with Hill cipher
[49]Menezes–Vanstone elliptic curve