Table 1.
Reference | [25] | [27] | [28] | [30] | [31] | [36] | [37] | [38] | [42] | [43] |
---|---|---|---|---|---|---|---|---|---|---|
Publication Year | 2015 | 2016 | 2016 | 2017 | 2017 | 2018 | 2018 | 2018 | 2019 | 2019 |
Chaos | ||||||||||
Chaos validation | √ | - | √ | √ | √ | - | √ | √ | √ | √ |
Security | ||||||||||
Key space | √ | √ | √ | √ | √ | √ | √ | √ | - | √ |
Key sensitivity | √ | √ | √ | √ | √ | √ | √ | √ | - | √ |
Plain text sensitivity | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
Graphic histogram | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
Histogram statistics | - | - | - | - | √ | - | - | - | - | √ |
Histogram uniformity | - | - | - | - | - | - | - | - | - | - |
Graphic correlation | √ | √ | √ | √ | √ | √ | - | √ | √ | - |
Correlation coefficient | √ | √ | √ | √ | √ | √ | - | √ | √ | √ |
Graphic autocorrelation | - | - | - | - | - | - | - | - | - | - |
Information entropy | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
Encryption quality | - | - | √ | √ | - | - | √ | √ | - | - |
Decryption error | √ | - | - | - | - | - | - | - | - | - |
Floating frequency | - | - | - | - | - | - | - | - | - | - |
Noise robustness | - | - | - | - | √ | - | - | √ | - | - |
Occlusion robustness | - | - | √ | √ | - | - | - | √ | - | - |
Cost and performance | ||||||||||
Memory requirements | - | - | - | - | √ | - | - | - | - | - |
Algorithm efficiency | - | √ | - | - | - | - | √ | - | - | - |
Speed analysis | √ | √ | √ | √ | √ | √ | √ | √ | √ | - |
Algorithm and implementation | ||||||||||
Flexibility | - | - | - | - | - | - | - | - | - | - |
Simplicity | - | - | - | - | - | - | - | - | - | - |