Review Article
Computational Image Encryption Techniques: A Comprehensive Review
Table 8
Comparison of various optical-based image encryption approaches.
| Ref. | HA | KA | IE | NA | NPCR | UACI | CA | PSNR |
| [132] | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✓ | ✓ | [133] | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | [134] | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✗ | [136] | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✗ | [137] | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | [135] | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ |
|
|