Method | Advantages | Disadvantages |
---|---|---|
Modified AES Based Algorithm 2007 |
Better performance | Time taking and risky |
Block-Based Transformation Algorithm, 2008 |
No key generator, correlation between image elements decreased and higher entropy |
Image loosing and lower Correlation |
Self-Invertible Key Matrix Of Hill Cipher Algorithm, 2008 |
Matrix Based and Encrypt Gray Scale |
Cannot encrypt image with same gray level or color |
A Combination Of Permutation Technique Followed By Encryption, 2008 |
Higher Entropy and Correlation between image elements decreased |
Permutation process is too complex, Time taking and also chances of mistakes are high |
A Novel Image Encryption Algorithm Based On Hash Function, 2010 |
Because of encryption done in two phases chances of mistakes is low |
Encryption done in two phases so will be increases |
A Digital Image Encryption Algorithm Based Composition Of Two Chaotic Logistic Maps, 2010 |
Better than all above because of two logistics maps, Uses external sacred keys and Strong security |
Lot of confusion in process |
New Modified Version Of Advance Encryption Standard Based Algorithm For Image Encryption, 2010 |
Higher security | The algorithm and the secret key, consequently a same data will be ciphered to the same value; which is the main security weakness. |
Image Encryption Using Affine Transform And XOR Operation, 2011 |
Better Solution and Correlation between pixels values significantly decreases |
Lengthy, complicated and chances of mistakes is high |
Permutation Based Image Encryption Technique, 2011 |
Three phases process | High chances of error in key Generation |
Image Encryption Using Chaotic Maps And DNA Addition Operation And Noise Effects On It, 2011 |
Easy to represent | Not a cost effective process |
Image Encryption Based On The General Approach For Multiple Chaotic System, 2011 |
Large key space and high-level security, high obscure level and high speed |
Demonstrate process |
Statistical Analysis Of S-Box In Image Encryption Application Based On Majority Logic Criterion, 2011 |
Correlation analysis, entropy analysis, contrast analysis, homogeneity analysis, energy analysis and mean of absolute deviation analysis |
Complicated and lengthy process because there are lot of analysis done in single technique. Also here time factor will be increases. |
The Integration Of A Shifting Technique And The AES Algorithm March 2012 |
Improved and effective method | Possibility of mistakes while preparing shifting table, it is lengthy and difficult process |
Design And Analysis Of A Novel Digital Image Encryption Scheme March 2012 |
Simple, fast and secured against any attack |
Large, complicated and very difficult performance and security analysis |
Secret Key Encryption Algorithm Using Genetic Algorithm April 2012 |
Encryption method satisfies the goal of encrypting the images |
Complicated and algorithm is too lengthy |
New Advance Image Encryption To Enhance Security Of Multimedia Concept July 2012 |
Best performance, the lowest correlation and the highest entropy |
Three phase process and every image is very complicated |
Standard GGH | A good matrix implementation, Lattice based, easy representation, Correct decryption even with less errors, suitable for high resolution pictures | Low entropy, High correlation, needs more bits after encryption |
Padding based GGH | Same as GGH, Lowest correlation, Highest Entropy | Need more bits for cipher image |