Review Article
Computational Image Encryption Techniques: A Comprehensive Review
Table 4
Comparison of various cellular automata-based image encryption approaches.
| Ref. | Technique | KA | NPCR | UACI | IE | CA | HA | PSNR | MSE |
| [54] | Reversible cellular automata | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | [55] | Cellular automata | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | [67] | Logistic mapped convolution | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | [56] | Partitioned cellular automata | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | [57] | Hybrid chaotic system | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [58] | Memristive hyperchaotic | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | [59] | Holography | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | [60] | Kronecker compressed sensing | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | [61] | Weighted histogram | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [62] | Pixel separation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [68] | 8-layer cellular automata | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [63] | Quantum cellular automata | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | [64] | Conway’s cellular automata | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | [65] | Quadtree decomposition | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | [69] | DNA and cellular automata | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | [66] | Hybrid DNA | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | [70] | 3D cellular automata | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | [51] | Chaotic skew tent map | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [71] | order cellular automata | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | [72] | Linear cellular chaos-based automata | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | [52] | FSM-based DNA | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | [53] | Coupled logistic Bernoulli map | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
|
|