Table 8 Comparison with state-of-the-art image encryption techniques.
From: Adaptive image encryption approach using an enhanced swarm intelligence algorithm
Author | Year | Correlation coefficient | Entropy | NPCR | UACI | |||
---|---|---|---|---|---|---|---|---|
H | V | D | ||||||
Ravichandran et al.48 (16 bit) | 2021 | 0.0016 | 0.0006 | 0.0022 | 15.7850 | 99.6067 | 33.4700 | |
Meng et al.49 (16 bit) | 2022 | − 0.0080 | 0.0010 | − 0.0074 | 15.5872 | 99.9974 | 33.2819 | |
Muthu and Murli50 (16 bit) | 2022 | − 0.0029 | 0.0014 | 0.0012 | – | 99.9728 | 33.4782 | |
Wu et al.51 (8 bit) | 2023 | − 0.0164 | 0.0056 | 0.0289 | 7.9993 | 99.6128 | 33.5196 | |
Naguib et al.52Â (8 bit) | 2024 | 0.0013 | 0.0037 | 0.0005 | 7.9878 | 99.5070 | 34.4460 | |
Proposed | 8 bit | 2024 | − 0.0032 | 0.0023 | − 0.0014 | 7.9995 | 99.6078 | 33.4517 |
16 bit | − 0.0020 | − 0.0042 | − 0.0034 | 15.8124 | 99.9969 | 33.3892 |