Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 4

Comparison of various cellular automata-based image encryption approaches.

Ref.TechniqueKANPCRUACIIECAHAPSNRMSE

[54]Reversible cellular automata
[55]Cellular automata
[67]Logistic mapped convolution
[56]Partitioned cellular automata
[57]Hybrid chaotic system
[58]Memristive hyperchaotic
[59]Holography
[60]Kronecker compressed sensing
[61]Weighted histogram
[62]Pixel separation
[68]8-layer cellular automata
[63]Quantum cellular automata
[64]Conway’s cellular automata
[65]Quadtree decomposition
[69]DNA and cellular automata
[66]Hybrid DNA
[70]3D cellular automata
[51]Chaotic skew tent map
[71] order cellular automata
[72]Linear cellular chaos-based automata
[52]FSM-based DNA
[53]Coupled logistic Bernoulli map