Table 4: Evaluation and comparing with the literature review methods in terms of advantages and disadvantages.

Method Advantages Disadvantages
Modified AES Based
Algorithm 2007
Better performance Time taking and risky
Block-Based Transformation
Algorithm, 2008
No key generator, correlation
between image elements
decreased and higher entropy
Image loosing and lower
Correlation
Self-Invertible Key Matrix Of
Hill Cipher Algorithm, 2008
Matrix Based and Encrypt Gray
Scale
Cannot encrypt image with same
gray level or color
A Combination Of Permutation
Technique Followed By
Encryption, 2008
Higher Entropy and Correlation
between image elements
decreased
Permutation process is too
complex, Time taking and also
chances of mistakes are high
A Novel Image Encryption
Algorithm Based On Hash
Function, 2010
Because of encryption done in
two phases chances of mistakes
is low
Encryption done in two phases
so will be increases
A Digital Image Encryption Algorithm
Based Composition Of Two Chaotic
Logistic Maps, 2010
Better than all above because of two
logistics maps, Uses external sacred
keys and Strong security
Lot of confusion in process
New Modified Version Of
Advance Encryption Standard
Based Algorithm For Image
Encryption, 2010
Higher security The algorithm and the secret
key, consequently a same data
will be ciphered to the same
value; which is the main security
weakness.
Image Encryption Using Affine
Transform And XOR
Operation, 2011
Better Solution and Correlation
between pixels values
significantly decreases
Lengthy, complicated and
chances of mistakes is high
Permutation Based Image
Encryption Technique, 2011
Three phases process High chances of error in key
Generation
Image Encryption Using
Chaotic Maps And DNA
Addition Operation And Noise
Effects On It, 2011
Easy to represent Not a cost effective process
Image Encryption Based On
The General Approach For
Multiple Chaotic System, 2011
Large key space and high-level
security, high obscure level and
high speed
Demonstrate process
Statistical Analysis Of S-Box In
Image Encryption Application
Based On Majority Logic
Criterion, 2011
Correlation analysis, entropy
analysis, contrast analysis,
homogeneity analysis, energy
analysis and mean of absolute
deviation analysis
Complicated and lengthy process
because there are lot of analysis
done in single technique. Also
here time factor will be
increases.
The Integration Of A Shifting
Technique And The AES
Algorithm March 2012
Improved and effective method Possibility of mistakes while
preparing shifting table, it is
lengthy and difficult process
Design And Analysis Of A
Novel Digital Image Encryption
Scheme March 2012
Simple, fast and secured against
any attack
Large, complicated and very
difficult performance and
security analysis
Secret Key Encryption
Algorithm Using Genetic
Algorithm April 2012
Encryption method satisfies the
goal of encrypting the images
Complicated and algorithm is
too lengthy
New Advance Image
Encryption To Enhance
Security Of Multimedia
Concept July 2012
Best performance, the lowest
correlation and the highest
entropy
Three phase process and every
image is very complicated
Standard GGH A good matrix implementation, Lattice based, easy representation, Correct decryption even with less errors, suitable for high resolution pictures Low entropy, High correlation, needs more bits after encryption
Padding based GGH Same as GGH, Lowest correlation, Highest Entropy Need more bits for cipher image