Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 6

Comparison of various metaheuristic image encryption approaches.

Ref.NPCRUACIKAHAIECA

[11]
[105]
[102]
[106]
[100]
[96]
[107]
[108]
[109]
[110]
[111]