Table 1 Reviewed recent literature categorization.

From: A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5

Ref.

Method

Chaos theory

SVD

RC5 & variants

Hill cipher

Goal

8

  

\(\checkmark\)

 

KS, E, RRA

9

 

\(\checkmark\)

  

E

10

\(\checkmark\)

\(\checkmark\)

  

E

11

\(\checkmark\)

\(\checkmark\)

  

RRA

12

\(\checkmark\)

\(\checkmark\)

  

RRA

13

\(\checkmark\)

\(\checkmark\)

  

RRA

14

 

\(\checkmark\)

  

RRA

15

\(\checkmark\)

\(\checkmark\)

  

RRA

16

 

\(\checkmark\)

  

E, RRA

17

  

\(\checkmark\)

 

E

18

\(\checkmark\)

 

\(\checkmark\)

 

E, RRA

19

  

\(\checkmark\)

 

E, RRA

20

\(\checkmark\)

 

\(\checkmark\)

 

E, RRA

21

  

\(\checkmark\)

 

KS, E, RRA

22

\(\checkmark\)

   

E, RRA

23

\(\checkmark\)

   

E, RRA

24

\(\checkmark\)

   

E, RRA

25

\(\checkmark\)

   

RRA

26

\(\checkmark\)

   

KS, E, RRA

27

\(\checkmark\)

   

KS, E, RRA

28

\(\checkmark\)

   

KS, E, RRA

29

\(\checkmark\)

   

KS, E, RRA

30

\(\checkmark\)

   

KS, E, RRA

31

\(\checkmark\)

   

E, RRA

32

\(\checkmark\)

   

KS, E, RRA

33

\(\checkmark\)

   

KS, E, RRA

34

\(\checkmark\)

   

E, RRA

35

\(\checkmark\)

   

KS, RRA

36

\(\checkmark\)

   

KS, E, RRA

37

\(\checkmark\)

   

KS, E, RRA

38

   

\(\checkmark\)

RRA

39

\(\checkmark\)

  

\(\checkmark\)

RRA

40

   

\(\checkmark\)

KS, E, RRA

41

\(\checkmark\)

  

\(\checkmark\)

RRA

42

   

\(\checkmark\)

RRA

43

\(\checkmark\)

  

\(\checkmark\)

RRA

44

\(\checkmark\)

   

RRA

  1. In the Goal column, the acronyms KS, E, and RRA are used, representing key space > \(2^{500}\), efficiency, and robustness and resistance to attacks, respectively.