Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 5

Comparison of various DNA-based image encryption approaches.

Ref.KANPCRUACIIECAHAPSNRMSE

[90]
[76]
[15]
[81]
[77]
[73]
[79]
[80]
[82]
[91]
[83]
[84]
[92]
[93]
[85]
[94]
[86]
[95]
[87]
[78]
[88]
[89]