Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 7

Comparison of various compressive sensing encryption approaches.

Ref.HAKAIENANPCRUACICAPNSRMSE

[114]
[115]
[116]
[117]
[118]
[119]
[120]
[121]
[123]
[124]
[125]
[126]
[127]
[12]
[128]
[129]
[130]