Review Article
Computational Image Encryption Techniques: A Comprehensive Review
Table 5
Comparison of various DNA-based image encryption approaches.
| Ref. | KA | NPCR | UACI | IE | CA | HA | PSNR | MSE |
| [90] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [76] | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | [15] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [81] | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | [77] | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | [73] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [79] | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | [80] | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | [82] | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | [91] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [83] | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | [84] | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | [92] | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | [93] | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | [85] | ✓ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | [94] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | [86] | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | [95] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [87] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [78] | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | [88] | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | [89] | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
|
|