Skip to main content
. 2019 Aug 20;21(8):815. doi: 10.3390/e21080815

Table 1.

Security analysis presented in recent chaos-based image cryptosystems, where √ means “presented” and - means “not presented”.

Reference [25] [27] [28] [30] [31] [36] [37] [38] [42] [43]
Publication Year 2015 2016 2016 2017 2017 2018 2018 2018 2019 2019
Chaos
Chaos validation - -
Security
Key space -
Key sensitivity -
Plain text sensitivity
Graphic histogram
Histogram statistics - - - - - - - -
Histogram uniformity - - - - - - - - - -
Graphic correlation - -
Correlation coefficient -
Graphic autocorrelation - - - - - - - - - -
Information entropy
Encryption quality - - - - - -
Decryption error - - - - - - - - -
Floating frequency - - - - - - - - - -
Noise robustness - - - - - - - -
Occlusion robustness - - - - - - -
Cost and performance
Memory requirements - - - - - - - - -
Algorithm efficiency - - - - - - - -
Speed analysis -
Algorithm and implementation
Flexibility - - - - - - - - - -
Simplicity - - - - - - - - - -