Review Article

Computational Image Encryption Techniques: A Comprehensive Review

Table 9

Comparison of various transform domain-based image encryption approaches.

Ref.KANPCRUACIIECAHAPSNRMSE

[143]
[144]
[145]
[149]
[150]
[151]
[152]
[153]
[154]