Table 1 Summary of related works in iage encryption.
Author (Year) | Technique / Key Exchange | Remarks |
---|---|---|
Enayatifar et al. (2014)23 | DNA and Logistic Map | High entropy, low correlation; sensitive to parameter selection. |
Kari et al. (2021)24 | 2D Logistic-Sine Chaos | Strong diffusion; lacks formal key management. |
Kumar et al. (2021)25 | Cellular Automata (Rule-based) | Fast and simple implementation; limited key space. |
Alawida et al. (2024)26 | AES and Chaotic Map | Lightweight and suitable for IoT; moderate avalanche effect. |
Tanksale et al. (2024)27 | AES and ECC, ECDH (secp256r1) | Robust key exchange; computationally intensive for constrained platforms. |
CAFE (Proposed) | AES, Rule 30 CA and ECDH (Curve25519) | Secure key derivation and lightweight implementation; grayscale-only evaluation. |