1 Introduction

Due to advancement in distributed computer networks, storage devices, and imaging tools, the digital images have been extensively used in various fields [1]. As images are communicated over public networks, they are prone to various security threats such as eavesdropping, illegal modification, duplication, etc. Therefore, securing the image in an efficient manner has received much attention in last few years. Figure 1 shows the classification of information security techniques. The security system is divided into two parts namely information hiding techniques and cryptography. The information hiding techniques are further decomposed into watermarking and steganography.

Fig. 1
figure 1

Classification of information security techniques

In case of cryptography, the actual data is converted into meaningless form before communicating over public networks. Image encryption algorithms are the most important strategies to protect the images [2]. Steganography injects given information into a cover media like digital images, audio signals or videos, to hide its existence. Thus, steganography achieves information hiding in such a way that no one can recognize the existence of data except the intended receiver. Whereas, in case of cryptography, the existence of information is not hidden but its values are obscured [3]. In digital watermarking, the digital contents are embedded with a unique identification signal known as watermark. To authenticate the digital contents, watermark will be extracted from the watermarked image at receiver end. The digital contents can be audio, image, video, and text. Whenever the watermarked images are found to be illegally reused, the embedded watermark can be extracted to verify the ownership claims [4, 5].

1.1 General Framework

Figure 2 illustrates the general framework of image encryption techniques. An input image that needs to be encrypted is called a plain-image and encrypted image is known as a ciphered image. The plain and ciphered images are represented by P and C, respectively. The encryption process is demonstrated as

$$\begin{aligned} C= {EF}_{EK}(P) \end{aligned}$$
(1)

where EF() is the encryption function that applied on P using encryption key (EK). Similarly, at receiver end, the decryption process retrieves the original image using decryption key (DK) and decryption function (DF()) as follows:

$$\begin{aligned} P={DF}_{DK}(C) \end{aligned}$$
(2)

The image encryption techniques can be divided as symmetric and asymmetric techniques. In case of symmetric image encryption, the encryption and decryption keys are same, i.e.,\(EK = DK\). The keys are to be kept secret during the communication. When different keys are used for encryption and decryption, the image encryption is known as asymmetric image encryption, i.e., \(EK \ne DK\). In this system, EK is taken as public whereas DK is kept private.

Fig. 2
figure 2

Generic framework of image encryption techniques

The motivation behind this study is to explore various issues associated with the existing image encryption techniques. This paper provides a survey of current image encryption techniques with their pros and cons. The purpose of this paper is three folds:

  1. (i)

    There is hardly any literature found on meta-heuristic based image encryption techniques. This is the reason that we decided to do a systematic study of existing image encryption techniques.

  2. (ii)

    Meta-heuristic based image encryption techniques outperform existing techniques especially against various cryptanalysis. Therefore, it becomes necessary to study the existing cryptanalysis techniques.

  3. (iii)

    Each image encryption technique has its own benefits and limitations. Some techniques are robust against various attacks but suffer from computational speed. Therefore, it is necessary to study the trade-off between computational speed and performance against various security attacks.

The main contributions of this paper are:

  1. (i)

    A comprehensive study has been conducted to explore various image encryption techniques, especially meta-heuristic encryption techniques.

  2. (ii)

    The various attacks and performance measures related to image encryption techniques have also been studied.

  3. (iii)

    The existing techniques have been analyzed with respect to differential, statistical, and key analyses.

  4. (iv)

    The future research directions which inhibit the design of efficient image encryption techniques have been explored.

The remaining structure of this paper is as follows: The performance metrics of image encryption techniques are explained in Sect. 2. Section 3 presents the brief description of existing image encryption techniques. Section 4 discusses comparative analyses based on quality metrics. The study of various cryptanalysis techniques is presented in Sect. 5. Section 6 demonstrates the various applications of image encryption. Sections 7 and 8 discuss the applications and future research directions of image encryption. The concluding remarks are presented in Sect. 9.

2 Evaluation Measures

Evaluation measures are very necessary to confirm the effectiveness of image encryption technique. The various characteristics of an image encryption algorithm are explored using these parameters.

2.1 Differential Analysis

Number of Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) parameters are used to analyze the differential attacks. The differential attack is used to tests the sensitivity of encryption algorithm toward slightest changes in plain image. Attackers often make a slight change in the original image. Then, encrypt the original and modified images using same secret key. Afterwards, try to find the relationship between encrypted images of original and modified images.

2.1.1 Number of Pixel Change Rate (NPCR)

It is defined as the percentage of different pixel numbers between two encrypted images, whose plain images have only one pixel difference. If any technique provides high value of NPCR, then the algorithm is better against differential attacks [6]. NPCR can be computed as follows [6]:

$$\begin{aligned} NPCR=\frac{\sum _{i,j} D(i,j) }{W\times H}\times {100} \end{aligned}$$
(3)

Here,

$$\begin{aligned} D(i,j)=\left\{ \begin{array}{ll} 0 &{\text{if}}\; E(i,j)=E^{\prime }(i,j)\\ 1 &{\text{if}} \; E(i,j)\ne E^{\prime }(i,j) \end{array}\right. \end{aligned}$$
(4)

where W and H represent width and height of image, respectively. D(ij) indicates the difference between corresponding pixels of encrypted image of original image (E′(ij)) and encrypted image of changed image (E(ij)). The range of NPCR \(\in\) [0, 100]. NPCR value of an encrypted image should be close to 100.

2.1.2 Unified Average Changing Intensity (UACI)

It measures the average intensity of difference between two encrypted images, corresponding to plain images that have one pixel difference [7]. It can be defined as follows [8]:

$$\begin{aligned} UACI=\frac{\sum _{i,j} E(i,j)-E^{\prime }(i,j)}{255\times W \times H}\times {100} \end{aligned}$$
(5)

where E(ij) and \(E^{\prime }(i, j)\) are the encrypted images of original and changed images, respectively. The values of NPCR and UACI need to be maximized.

2.2 Statistical Analysis

The encryption techniques can also be broken using the statistical analysis of an encrypted image. Histogram Analysis (HA) and Correlation Coefficient (CC) are used to analyze the adjacent pixels of an encrypted image to confirm the robustness of an encryption technique against statistical attacks.

2.2.1 Histogram Analysis (HA)

It reveals the distribution of pixel values of an image. The histogram of original image should be totally different from the histogram of an encrypted image. The histograms of plain images are non-uniform in nature. While the histograms of encrypted images should be uniform in nature [2]. It means that all pixels are distributed equally in the space. Figure 3 shows the histograms of plain and encrypted Lena images. Figure 3b shows the histogram of plain Lena image in which pixels are not uniform. From Fig. 3d, it can be observed that pixels of an encrypted image are uniformly distributed.

Fig. 3
figure 3

a Plain Lena image, b histogram of plain image, c encrypted Lena image, and d histogram of encrypted image

2.2.2 Correlation Coefficient (CC)

It is used to find the similarity between corresponding pixels of an original and encrypted image. The values of adjacent pixels of an original image are strongly correlated in three directions, i.e., horizontal, diagonal, and vertical. The good image encryption technique is one which reduces this relationship in ciphered image [9]. Correlation coefficient can be computed as follows [10]:

$$\begin{aligned} r_{x,y}=\frac{C(x,y)}{\sqrt{D(x)}.\sqrt{D(y)}} \end{aligned}$$
(6)

Here,

$$\begin{aligned} C(x,y)= \frac{\sum _{i=1}^K(x_i-E(x))(y_i-E(y))}{K} \end{aligned}$$
(7)
$$\begin{aligned} D(x)= \frac{1}{K} \sum _{i=1}^K(x_i-E(x))^2\end{aligned}$$
(8)
$$\begin{aligned} D(y)= \frac{1}{K} \sum _{i=1}^K(y_i-E(y))^2 \end{aligned}$$
(9)

where C(xy) is the covariance between samples x and y. x and y are the coordinates of an image. K is the number of pixel pairs \((x_i,y_i)\). D(x) and D(y) are the standard deviation of x and y, respectively. E(x) is the mean of \(x_i\) pixel values. The range of CC\(\in\)\([-1,1]\). The CC value of an encrypted image should be near to 0.

2.3 Information Entropy (IE)

It measures the average information per bit in an image. It contains the possible information available in the given image. Each pixel has different value. Therefore, the entropy of an encrypted image means each pixel has equal probability with uniform distribution [11]. It can be computed as:

$$\begin{aligned} H(S)=-\sum _{s}(P(s_i)\times \log_{2 }P(s_i)) \end{aligned}$$
(10)

where H(S) represents the entropy of message source (S). \(P(s_i)\) denotes the probability of occurrence of \(s_i\). The value of \(IE \in [0,8]\). It should be close to 8 for 8-bit image.

2.4 Key Analysis (KA)

Security keys are the core part of any encryption algorithm as the strength of algorithm depends on it. The secret keys should be strong enough to resist all types of attacks. The desirable properties of strong secret keys are large key space and high sensitivity [1]. The key space depends on the size of secret key. If the size is large, then it is harder for an attacker to estimate the same key. Key sensitivity means that if attacker modify even a single pixel in the original key, then the original image remains unrecoverable.

2.5 Noise Attack (NA)

To destroy the useful information, attacker may introduce noise in the encrypted image. Due to this, the intended user cannot recover the original image successfully after decryption. The attacker introduce additive, Gaussian, Poisson noise, etc. in the encrypted image [2]. Therefore, an efficient image encryption technique should be resistant to noise attacks.

2.6 Execution Time (ET)

Execution time (ET) is measured as the time required to execute a given image encryption technique. It is the aggregation of compile and run time. For practical implementation of image encryption, ET should be minimum. It is generally measured in seconds, milliseconds or minutes [12].

2.7 Bit Correct Ratio (BCR)

BCR is used to estimate the difference between an original image and decrypted image. It checks the correctness of decrypted image [13]. It can be calculated as [13] follows:

$$\begin{aligned} BCR=\left( 1-\frac{\sum _{x,y}^{M \times N} {O(x,y) \oplus R(x,y)}}{M \times N}\right) \end{aligned}$$
(11)

where x and y are the pixel coordinates of images having size of \(M \times N\) pixels. O is an original image and R is the decrypted image. \(\oplus\) represents the XOR operation. The range of \(BCR\in [0,1]\).

2.8 Mean Squared Error (MSE)

MSE helps to compare the “true” pixel values of an original image to decrypted image. The error is amount by which the values of an original image differ from decrypted image [14]. MSE can be defined as follows:

$$\begin{aligned} MSE=\frac{1}{MN}\sum _{x=1}^{x=M} \sum _{y=1}^{y=N}[O(x,y)-R(x,y)]^2 \end{aligned}$$
(12)

where x and y are the pixel coordinates of images with size of \(M \times N\) pixels. O and R are the original and decrypted images, respectively. The value of \(MSE\in [0,\infty ]\). The value of MSE between original and decrypted should be minimum.

2.9 Peak Signal to Noise Ratio (PSNR)

PSNR is used as a quality measurement between the original and decrypted images [15]. PSNR can be mathematically computed as follows:

$$\begin{aligned} PSNR= 10 \log_{10}\frac{({2^n-1})^2}{MSE} \end{aligned}$$
(13)

where n represents the number of bits per pixel. PSNR is measured in decibel (dB). The value of \(PSNR \in [0,\infty ]\). The value of PSNR should be maximum between original and decrypted images.

2.10 Signal to Distortion Ratio (SDR)

SDR measures the rate of distortion between the pixel values of an original and decrypted images [16]. It is calculated as:

$$\begin{aligned} SDR = 10 \log_{10}\frac{\sum _{x,y}O(x,y)^2}{\sum _{x,y}(O(x,y)-D(x,y))^2} \end{aligned}$$
(14)

where O(xy) and D(xy) represent the original and decrypted images, respectively. x and y are the pixel coordinates of images with size of \(M\times N\). SDR is measured in decibel units. The value of \(SDR\in [0,\infty ]\). The SDR value between original and decrypted images should be minimum.

2.11 Structural SIMilarity Index (SSIM)

SSIM reveals the similarity between original and decrypted images. It is quality assessment parameter of decrypted image. It is calculated between various windows of images having same size [16]. It can be defined as follows:

$$\begin{aligned} SSIM = \frac{(2\mu _I\mu _D+C_1)(2\sigma _{ID}+C_2)}{(\mu _I^2+\mu _D^2+C_1)(\sigma _I^2+\sigma _D^2+C_2)} \end{aligned}$$
(15)

where \(\mu _I\) and \(\mu _D\) represent the average of an input (I) and decrypted (D) images, respectively. \(\sigma _I^2\) and \(\sigma _D^2\) represent the variance of I and D, respectively. \(\sigma _{ID}\) represents the co-variances of I and D. \(C_1\) and \(C_2\) are the regularization constants with value \({(0.01P)}^2\) and \({(0.03P)}^2\). where P is the specified dynamic range value. The range of \(SSIM \in [-1,1]\).

2.12 Root Mean Squared Error (RMSE)

RMSE evaluates the root of MSE to give more precise and accurate data [17]. It can be mathematically computed as:

$$\begin{aligned} RMSE=\sqrt{\frac{\sum _{x=1}^{M} \sum _{y=1}^{N}[O(x,y)-D(x,y)]^2}{MN}} \end{aligned}$$
(16)

where x and y are the pixel coordinates of images with size of \(M \times N\). O and D are the original and decrypted images. The range of \(RMSE \in [0,\infty ]\).

2.13 Mean Absolute Error (MAE)

MAE measures the difference between encrypted and original images [18]. It can be evaluated as:

$$\begin{aligned} MAE = \frac{1}{MN} \sum _{x=1}^{M} \sum _{y=1}^{N}|O(x,y)-E(x,y)| \end{aligned}$$
(17)

where O(xy) and E(xy) denote original and encrypted images, respectively. x and y are the pixel coordinates of image with size of \(M\times N\). The range of \(MAE \in [0,2^n-1]\), where n is number of bits per pixel. It should be maximum between original and encrypted images.

2.14 Signal to Noise Ratio (SNR)

SNR evaluates the results of an encryption algorithm quantitatively [19]. It can be computed as:

$$\begin{aligned} SNR = \frac{\sum _{m,n}{[O(m,n)]}^2 }{\sum _{m,n}{[O(m,n)-D(m,n)}]^2} \end{aligned}$$
(18)

where O(mn) and D(mn) represent original and decrypted images, respectively, with pixel coordinates m and n. The range of \(SNR \in [1,\infty ]\). The value of SNR should be maximum between original and decrypted images.

3 Image Encryption Techniques

In this section, the classification of image encryption techniques is presented. Image encryption techniques are broadly classified into four categories, i.e., optical, spatial, transform domain, and compressive sensing. Figure 4 shows the classification of image encryption techniques. The above-mentioned image encryption techniques are described in the preceding subsections.

Fig. 4
figure 4

Classification of image encryption techniques

Comparison between these image encryption techniques is also carried out using certain performance metrics. These metrics are NPCR, UACI, KA, HA, CC, IE, NA, KCPA and speed. Here, ✓ means given technique has considered the corresponding metric. In the same way, ✗ states that given technique has not considered the respective metric.

3.1 Spatial Domain Based Image Encryption Techniques

The term spatial domain refers to the image plane itself which is direct manipulation of pixels. Spatial domain based techniques are those techniques which are directly applied on these pixels. The various spatial domain based techniques have been discussed in subsequent sections.

3.1.1 Chaos Based Image Encryption Techniques

Chaotic maps are studied in dynamic environment as they exhibit chaotic behaviour. It means that small change in initial conditions can produce drastic change in outputs. These maps are categorized as discrete maps and continuous maps. Chaotic maps are extensively utilized in secure communication and considered favorable trade-off between security and computational speed. The chaos-based encryption technique possesses several features such as sensitivity to initial circumstances, determinacy, and ergodicity [20].

Fig. 5
figure 5

Image encryption using chaotic maps [21]

The chaotic maps divide an image into dual phases, i.e., diffusion and permutation to generate a cipher. In real time, cryptosystems developers may integrate permutation and diffusion to attain a significant computational security.

Figure 5 depicts the process of chaos-based image encryption technique. The permutation or confusion phase shuffles the image circularly using pseudo-random sequence based on plain image. It resolves key dependent problem. In diffusion phase, scrambled image is decomposed into several blocks. It selects preceding block in order to update the pre-conditions of chaotic map. Therefore, the key sequence relies on the given image [21].

Table 1 shows the variants of chaotic map that have been used in the field of image encryption. The categorization of these variants have been done by considering the time domain, spatial domain, number of dimensions (Dim.) and number of parameters (Para.). It has been observed that each map requires different number of parameters to develop a secure key.

Table 1 Variants of chaotic map

Thus, chaotic maps have been widely used in different applications. The overview of chaos-based image encryption techniques has been discussed below.

Pareek et al. [31] used two logistic maps and one external key to encrypt an image. The initial conditions of logistic maps are derived from external key. The secret key is modified every time after encrypting the block of sixteen pixels of an image. Therefore, it is difficult for an attacker to discover the secret key. However, it is not sensitive toward the input images.

Behnia et al. [36] combined one-dimensional chaotic map with coupled map lattice to encrypt an image. This combination provides a large key space and high-level security. However, this method has low sensitivity towards input image as initial conditions of chaotic maps are not dependent on the input image.

Gao et al. [29] implemented the hyper-chaotic map in image encryption to reduce the prediction time than simple chaotic maps based image encryption techniques. In this technique, shuffling of matrix is utilized to permute the pixels of an input image. Thereafter, hyper-chaotic map is used to diffuse the pixel values of shuffled image. This technique provides better key space and high security.

Ye et al. [37] used logistic map to encrypt the images. In this technique, permutation is performed at bit level. This technique is robust against various security attacks. However, this technique suffers from known-plaintext and chosen-plaintext attacks [38].

Zhu et al. [39] proposed an image encryption technique that performs permutation and diffusion at bit-level. In this technique, Arnold map and logistic map are utilized to perform permutation and diffusion operations. This method is computationally efficient than the other image encryption techniques. However, permutation based image encryption techniques are prone to known-plaintext and known-ciphertext attacks [40, 41].

Mirzaei et al. [42] implemented an image encryption technique in parallel fashion. In this technique, an image is sub-divided into four blocks. Thereafter, chaotic map is used to shuffle these blocks. Then, each block is encrypted in parallel scheme by changing the pixel values of each block. This technique has better computational speed.

Kanso et al. [43] utilized three dimensional Arnold transform to generate secret keys to encrypt the images. This technique is divided into three phases such as shuffling, scrambling, and masking. This technique is highly sensitive towards an input image. It provides better security against known-plaintext and chosen-plaintext attacks. Wang et al. [44] designed an image encryption technique that performs selective encryption using spatial chaotic maps. It chooses first 4-bits of each pixel for encryption. It shows that encrypting only 50 % pixels of an input image provides better encryption results.

Khan and Shah [19] implemented the S-box in a chaotic manner using affine and Lorenz transforms to improve the algebraic and statistical properties of S-box. S-box is mainly used in block encryption to create confusion among pixels. It provides better confusion and diffusion to protect the input image against security attacks.

Zhang and Wang [45] proposed an image encryption technique based on mixed linear-nonlinear coupled map lattices. The mixed linear and nonlinear coupled map lattices overcome the issues of large periodic windows in bifurcations and small range of parameters. These maps are used to permute and diffuse an input image at bit level to generate an encrypted image.

Wang et al. [46] proposed an image encryption technique based on random integer cycle shift and one-dimensional chaotic map. In this technique, cycle shift technology is used to change the pixel values of an input image. It is used in image encryption because of its easy implementation; and it can be extended to any size of image.

Belazi et al. [6] improved scrambling technique using permutation-substitution arrangement and chaotic techniques. This technique has better security analysis and good key space. It consists of four cryptographic phases such as diffusion, substitution, diffusion, and permutation. These phases are carried out by enhanced chaotic map, S-box, logistic map, and permutation function to enhance the performance.

Liu et al. [47] improved the key space of [48] using two-dimensional Sine map and iterative chaotic map with infinite collapse modulation map (2D-SIMM). The permutation and diffusion processes are combined into one step to reduce the computational time.

To overcome the problem of fixed-point and dynamic key space of one-dimensional chaotic systems, Farajallah et al. [49] proposed three chaotic systems for image encryption. It is very effective against various security attacks and has good computational speed.

Chen et al. [50] designed a four-dimensional discrete chaotic map using sine function with one-line equilibrium to encrypt the images. The key space generated by chaotic map is greater than \(2^{1170}\). It provides significant avalanche effect as compared to other image encryption techniques.

Hua et al. [51] used the concept of image filtering in image encryption to enhance security. The image filtering can spread little change of plain-images to entire pixels of cipher-images. This technique provides better results than the existing image encryption techniques in terms of statistical and differential attacks.

Pak and Huang [52] developed a new chaotic system using the difference of output sequences of two same chaotic systems which removes the drawbacks of a single chaotic map. The image encryption is performed by permutation-diffusion-permutation architecture. However, the authors have not discussed the strength of image encryption technique against known-plaintext attacks.

Li et al. [53] discussed a permutation and diffusion architecture in which permutation is performed at pixel level as well as bit level to encrypt an image. This technique used 5-D chaotic map to overcome the drawbacks of low dimensional chaotic maps.

Table 2 Comparison between chaos based image techniques

Table 2 shows the performance comparison of chaos-based image encryption techniques. From the table, it has been observed that not even a single technique fulfills all the performance criteria.

3.1.2 DNA Based Image Encryption Techniques

In recent years, Deoxyribonucleic Acid (DNA) technology has impacted the various domains such as medical system, information science, etc. DNA molecules contain genetic code which store the data and can transform from one genetic code into another. In recent times, researchers have designed a simulation environment of biological experiments on DNA technology named as pseudo-DNA technology. This idea has been promoted the development of DNA in the field of encryption [59].

Figure 6 shows the block diagram of DNA-based image encryption process. Initially, the image is decomposed into Red (R), Green (G) and Blue (B) color channels. These three channels are transferred into binary matrices. DNA encoding rules are then applied to encode these matrices. To scramble the similarity between pixel values, DNA operations are applied on the encoded matrices. The decoding rules are then applied to convert them again into binary matrices. Finally, three color channels are combined to attain a cipher colored image [60].

Fig. 6
figure 6

Block diagram of DNA based encryption scheme [60]

The main reason for using DNA in image encryption are massive parallelism, ultra-low power consumption, and huge storage [46].

Wu et al. [61] proposed three improved one-dimensional chaotic maps with DNA sequences for color images cryptosystem. The input image and key stream are converted into matrices using DNA encoding rule. Thereafter, XOR and complementary operations are applied to scramble the matrices. The scrambled matrices are divided into equal blocks and shuffle them randomly. DNA addition and XOR operations performed on these matrices to get encrypted image. This technique resists against chosen and known-plain text attacks because three chaotic maps are used to generate a key stream that depends on both input image and secret keys.

Wang et al. [46] proposed an image encryption algorithm based on DNA sequence and coupled map lattice. The initial conditions for coupled map lattice are generated through extended hamming distance. The same key can be used to encrypt more than one images. Initially, XOR operation is performed on the pixels of input image by using coupled map lattice. DNA encoding rules are used to encode the confused image to obtain DNA matrix. Furthermore, the shuffled DNA matrix is diffused using coupled map lattice. The final encrypted image is attained by decoding the DNA rule. However, this technique is not sensitive toward the input image.

Kumar et al. [62] used combination of DNA encoding rules and Elliptic Curve Diffie-HEllman (ECDHE) for efficient image cryptography. First, the colored image is encoded using DNA encoding rules to obtain confused RGB matrices and then DNA operations are applied on these matrices. Finally, asymmetric ECDHE cryptography is applied on the image for encryption. The main benefit of this technique is to provide perfect forward secrecy and generate same security with small key size.

Li et al. [60] developed an improved image encryption technique for color images. The quaternary coding is used in DNA sequence to improve the encoding efficiency and enhance the security of keys by using complex and real chaotic maps. The hamming distance is used to generate one-time pad which further scramble the input image. This technique enhances the encoding efficiency of DNA based image encryption techniques.

Wang et al. [63] developed a DNA matrix by utilizing three color channels. Then, spatiotemporal chaos system is used to scramble the image. The hamming distance is utilized to permute DNA matrix. This technique has an ability to encrypt large size color images.

Mondal and Mandal [65] discussed a light weight image encryption technique by using pseudo random number and DNA. Two level encryption strategy is utilized. The encrypted technique have the ability to handle any kind of attack. However, the noise attack analysis has not been done in this technique.

Chai et al. [7] utilized complex chaotic systems and DNA rules to encrypt the plain images. Initially, color image is encoded using DNA rules. Thereafter, complex chaotic map is used to encrypt the encoded image. This technique is very effective against noise a and known-plaintext attacks.

Table 3 shows the comparison of DNA based image encryption techniques. DNA based image encryption techniques satisfy almost all of the performance metrics (can be seen from Table 3). However, these techniques have poor computational speed as compared to chaos based image encryption techniques.

Table 3 Comparison between DNA based image encryption techniques

3.1.3 Cellular Automata Based Image Encryption Techniques

Cellular Automata (CA) consists of cells which reside on grid with different form of structures. These structures evolve through some finite time steps according to the specified rules based on states of neighboring cells. Therefore, CA simulates the complex structures. The huge amount of CA regulations allow several techniques to develop sequences. It evolves through straightforward logic calculations, with pseudo-random and difficult behaviors. The reversible CA is extensively utilized by developers to execute block encryption technique. The main benefits of CA in encryption are huge amount of rules space and parallelism [65]. With the use of CA, image encryption techniques become lossless and adaptive for real-time applications. It also provides high security and fast operation [66]. Figure 7 shows the image encryption using cellular automata.

Fig. 7
figure 7

Image encryption using cellular automata [65]

Wang and Luan [67] proposed a new scheme for image encryption using the combination of chaotic map and reversible CA. The confusion stage uses the chaotic map to generate key stream which permutes the bits of an image. In this scheme, an image is divided into units and each unit contains 4 bits. The diffusion stage considers only higher 4 bits of each pixel because these higher bits provide all information about an image. The diffusion is achieved by applying reversible CA.

Bakhshandeh and Eslami [68] developed a new technique for image encryption based on chaotic maps, CA, and permutation-diffusion architecture. A piecewise linear chaotic map is used to permute the image in permutation phase. The diffusion phase uses logistic map and reversible memory CA to diffuse the permuted image to obtain a secure image. This technique has an authentication ability.

Ping et al. [69] proposed an image encryption scheme in which diffusion and confusion processes are done with the help of CA. CA generates good random sequences to create a scrambled image. Diffusion process uses the interaction between the local cells whereas confusion process is achieved through CA rules by applying on these cells.

Li et al. [13] proved that the integral imaging based encryption procedures have an ability to implement secure and strong image cryptography. It focuses on depth-adaptation integral images and Hybrid Cellular Automata (HCA). Initially, the actual image is divided into an elemental array by utilizing the depth-transformed integral technique. The evaluated elemental images are scrambled by utilizing HCA based chaotic maps. The superiority of this technique is its depth-transformed characteristic which consequently minimizes the magnification factor.

Mohamed [70] used CA to realize parallelization in image cryptography. The reversible CA is used to construct pseudo-random permutation which is used on different blocks independently. The plain image is decomposed into blocks.Thereafter, the secret keys and nonce are applied to encrypt each block independently. This technique is computationally fast as compared to other techniques.

Enayatifar et al. [71] introduced a hybrid model for image encryption which contains chaotic map, DNA, and CA. The input image is encrypted by using the sequences and operators of DNA with the help of CA. The rule number is selected through chaotic map. It suffers from poor computational speed.

Yang et al. [72] utilized a quantum CA in image encryption. The primary benefit of this technique is that it has time complexity of O(n) which is less than the traditional quantum encryption technique \(O(n^2)\).

Li et al. [73] designed an image encryption technique that uses depth-conversion integral imaging and CA to enhance the security. Depth-converted integral imaging technique is used to decompose the input image into an elemental image array. Thereafter, CA and chaotic map is utilized to encrypt the image. This technique reduces the magnification factor that degrades the reconstruction process.

Chai et al. [10] employed the memristive hyper-chaotic system, CA, and DNA sequence operations for image encryption. SHA-256 hash function is used to generate the secret key and compute the initial values of chaotic system. Moreover, a dynamic DNA encoding scheme is introduced. This method has an ability to resist known-plaintext and noise attacks.

Yaghouti Niyat et al. [74] proposed a non-uniform CA framework for image encryption to solve the problems of limited number of reversal rules. The key image is created using non-uniform CA and then hyper-chaotic mapping is used to select random numbers for encryption.

The image encryption techniques based on 2D CA masks provide encryption results with horizontal patterns. To overcome this issue, Li et al. [66] proposed an image encryption algorithm based on CA. In this technique, CA pixel-permutation is used to break the established orders of pixels. It provides large key space and highly sensitive towards secret keys.

The comparison between cellular automata based image encryption techniques has been depicted in Table 4. The most of techniques provide better results in terms of performance measures. The speed of these techniques is comparable to DNA-based image encryption techniques.

Table 4 Performance comparison of cellular automata based image encryption techniques

3.1.4 Meta-heuristics Based Image Encryption Techniques

Meta-heuristic techniques play a significant role to optimize the NP-Hard problems. The advantage of these techniques is to optimize the constant parameters required by encryption process. Evolutionary algorithms (EAs) have the ability to develop several feasible outcomes in single evolution as it is based upon population behavior [75].

Fig. 8
figure 8

Working of evolutionary optimization in encryption process [75]

Figure 8 shows the working of EA in encryption process. EA originates by producing the random samples from given population, i.e., problem domain. Based upon the appropriate objective function, EA find those samples which are best among the given samples. The main operators of EA are mutation, crossover, and recombination. These operators are used to evaluate best solution from obtained solutions. If the stopping criteria is satisfied, then EA returns best solution. Otherwise, the whole process is repeated to find appropriate solutions [76].

Abdullah et al. [77] used Genetic Algorithm (GA) for image encryption. This technique is used to select best encrypted image from the initial population. The chaotic technique is utilized to develop a given number of encrypted images. Thereafter, GA is used to select the best encrypted image which has high entropy and low correlation coefficient.

Sreelaja et al. [78] developed a technique to create secure keys by utilizing Ant Colony Optimization (ACO) algorithm. It reduces the burden of storage and distribution of keys. It enhances the security through encoding keys using a code table. In this technique, plain image is represented in the form of characters and key-stream is generated from the combinations of plaintext characters.

Enayatifar et al. [79] used weighted discrete Imperialist Competitive Algorithm (ICA) in image encryption. It provides best optimization results with maximum entropy and minimum correlation coefficients. The chaotic map is used to generate initial population for algorithm and then weighted discrete ICA is used to select the encrypted image with highest entropy and low correlation coefficient.

Enayatifar et al. [75] proposed an image cryptosystem based on hybrid GA and DNA sequence. A hybrid algorithm has an ability to improve the quality and choose best optimum mask. DNA sequence and chaotic map are used to generate DNA masks. Then, GA is used to select the optimum DNA mask. GA is used to maximize entropy during the encryption.

Abbas [16] described an image encryption algorithm based on Independent Component Analysis (ICoA) and Arnold Cat Map (ACM). ACM is used to create a random mixing matrix by injecting an arbitrary image. The source images are converted into vectors and combined with mixing matrix for mixing process that results in encryption of images. This technique can encrypt more than one image with the same process. Finally, ICoA is used to decrypted the images.

Talarposhti and Jamei [80] proposed an encryption algorithm for gray scale images based on Dynamic Harmony Search (DHS). This technique uses skew tent map to create encrypted images. DHS selects the best encrypted image based on maximum entropy and minimum correlation coefficient. The main drawback is its computational time.

Table 5 shows the performance comparison of evolutionary based image encryption techniques. The main drawback of these techniques is computational speed. However, these techniques provide better encryption as compared to the existing image encryption techniques.

Table 5 Comparison of evolutionary based image encryption techniques

3.1.5 Elliptic Curve and Fuzzy Based Image Encryption Techniques

Elliptic curves are based on the properties of algebraic curves. Koblitz and Miller developed a public key encryption technique by utilizing elliptic curve. The main features of elliptic curve encryption are small key size and better computational [3].

Fig. 9
figure 9

Encryption process using elliptic curve and chaotic map [12]

Figure 9 shows the role of elliptic curve in image in an encryption. A pseudo-random keystream developed using cyclic elliptic curve and chaotic technique. It contains two phases such as allocation for development of initial keystream using chaotic map and merging with pseudo-random bit sequence [12]. An image is initially decomposed into a binary data sequence. This data is masked with random keystream . The generation of keystream is done through hybridization of elliptic curve and chaotic system. The analogous encrypted image is attained.

El-Latif and Niu [12] proposed a technique to develop strong keystream based on hybridization of elliptic curve and chaotic maps. The input image is converted into data stream. Keys are applied to encryption function which are generated from the combination of elliptic curve and chaotic technique to mask the data. The encrypted data stream is converted into pixels of image to get ciphered image.

Behnia et al. [81] introduced an image encryption technique based on Jacobian elliptic maps. These maps are used to remove the drawbacks of chaotic cryptosystems such as small key space and weak security.

Nagaraj et al. [82] proposed a new image encryption technique which is the combination of elliptic curve cryptography and magic matrix operations. The input image is embedded on the points of the elliptic curve using transform algorithm. The image is divided into data matrices and each pixel of an image is represented by magic matrix. Thereafter, each pixel is encoded using elliptic cryptography function to generate an encrypted image.

Liu et al. [83] introduced a new color image encryption scheme based on chaotic maps and Choquet Fuzzy Integral (CFI) . This scheme uses a piecewise linear chaotic map to generate the secret keys and Lorenz map. It is used to initialize the inputs of CFI. CFI creates a random key-streams which are used to confuse and diffuse an image to obtain a decrypted image.

Seyedzadeh et al. [84] used CFI to generate a keystream to encrypt the color images. This technique has three phases such as generation of keystream, circular shift, and diffusion process. CFI is used to generate the pseudo-random key-streams and bits of each color pixel are shifted circularly based on key-stream. The permuted bits are encrypted using the combination of key-stream and color pixels.

Table 6 shows the performance comparison of elliptic and fuzzy based image encryption techniques. Both elliptic and fuzzy techniques are mainly used in image encryption to generate efficient secret keys.

Table 6 Performance comparison of elliptic and fuzzy based image encryption techniques

3.2 Transform Based Image Encryption Techniques

Transform based image encryption techniques have been extensively used in the field of image encryption. The given image is transformed from spatial to frequency domain by using suitable transform model. Figure 10 shows the working of transform domain based image encryption technique. It uses the double transform to encrypt the image [85]. For color images, the majority of schemes divide the input color image into three color channels (i.e., R, G, and B channels). Each color channel is converted into transform domain for encryption process.

Fig. 10
figure 10

Image encryption scheme using transformations [85]

The well-known techniques are fractional Mellin transform, Fractional Fourier Transform (FrFT), Gyrator Transform (GT), Discrete Cosine Transform (DCT), affine transform, etc. These techniques are discussed in the preceding sections.

3.2.1 Gyrator Transform Based Image Encryption Techniques

Singh and Sinha [86] implemented a novel cryptosystem using chaos in gyrator domain. In this technique, scrambled image is developed by utilizing gyrator domain and dual chaotic masks. The tent, Kaplan-Yorke and logistic map are used to encrypt the image. However, the computational speed is low.

Wang et al. [87] used linear exchanging operation and random phase encoding in GT domain for double image encryption. In the linear exchanging operation, two primitive images are linearly recombined via a random orthogonal transform matrix. The resultant blended images are employed to constitute a complex-valued image. Then, the image is encoded into a noise-like encrypted image by a Double Phase Random Encoding (DRPE). This scheme is highly sensitive towards the fractional orders of GT.

Wang et al. [88] used a Modified Gerchberg-Saxton Algorithm (MGSA) with Phase-Only Mask (POM) in GT domain for encryption. It reduces cross talk effect on multiplexing images.

Abuturab [89] proposed a new asymmetric image encryption technique for color images. A color image is divided into three channels and each channel is altered using Hartley transform. The altered channels are combined to get the first scrambled image. The first decryption key is generated by truncating the phase and amplitude of altered channels. GT is applied on already scrambled image to get the final encrypted image and second decryption key. The decryption process is reversible process to retrieve the original image.

Chen et al. [90] presented the solution for cross-talk disturbance found in phase-based images. This technique implements double image encryption using GT and local pixel scrambling scheme. Two images are encoded into a complex function and then this function is shuffled using local pixel scrambling. The shuffled image is rotated using GT to enhance the cryptosystem.

Yao et al. [91] encrypted the color images with the help of deduced GT. The primary feature of this algorithm is its decryption process. The encryption process involves gyrator and Fourier transform. But, decryption process involves only inverse of Fourier transform. This technique enhances the security of image encryption technique against the various attacks.

Table 7 shows the performance comparison of gyrator transform based image encryption techniques. From the table, it can be concluded that gyrator based image encryption techniques do not satisfy all the required performance measures. These techniques do not provide information regarding differential analysis.

Table 7 Comparison of gyrator transform based image encryption techniques

3.2.2 Fractional Fourier Transform Based Image Encryption Techniques

Wang et al. [92] proposed a optimistic technique of optical image scrambling by utilizing binary Fourier transform. The keys are developed using order of scrambled pixels to encrypt and decrypt the image. This technique provides good security and robust against noise and distortion attacks. The main advantage of this technique easy to implement.

Guo et al. [93] designed an improved color image cryptosystem by utilizing Arnold transform and discrete fractional random transform. R,G, and B channels of an input color image is converted into intensity-hue-saturation (IHS) color space. The intensity channels are encrypted by using discrete fractional random transform and Arnold transform. This technique saves the storage space of cryptosystem keys. Due to transform domain, it losses the potential detail in the actual image which degrades its performance.

Li et al. [94] proposed an encryption technique to encrypt multiple images using cascaded FrFt. The original images are decomposed into two phase masks. One phase mask is used to generate keys and another phase mask is used to encrypt the images. The decryption process uses reverse FrFt to obtain the original image and decryption keys.

Li and Lee [95] tried to overcome the drawback of occlusion in double image encryption using modified Computational Integral Imaging Reconstruction (CIIR). FrFT technique is used to encrypt the elemental image array which is stored through pickup process. The reconstruction process uses modified CIIR to obtain actual images which enhances the resolution of recovered images. The disadvantage of this scheme is that it increases the transmission overhead in network.

Ran et al. [96] suggested a solution to solve the problem of information-independency in an image encryption by applying Non-Separable Fractional Fourier Transform (NFrFT). This technique has potential of tangling the information along and across the directions together which is not possible in FrFT and GT.

3.2.3 Fresnel, Wavelet and Cosine Transform Based Image Encryption Techniques

Zhao et al. [97] proposed a multiple-image encryption technique based on the position multiplexing of Fresnel phase. This scheme is less time-consuming because of its non-iterative nature. The encryption key can be further designed to realize a better reconstruction of plaintext.

Wang et al. [98] suggested the solution of silhouette problem which is presented in interface-based encoding schemes using Fresnel transform and random phase modulation. This scheme used single beam implementation. Therefore, there is no need of beam splitting during the decryption process. It is also time-saving scheme because of non-iterative nature.

Wang et al. [99] addressed the issue of cross-talk noise in multiple-image encryption schemes. This technique implemented the retrieval algorithm and phase mask multiplexing in Fresnel domain. In this, each image is encrypted individually into a phase-only function to remove the noise.

Wang et al. [100] tried to eliminate the threat of information disclosure in image cryptosystems based on phase-truncation scheme. For this, a random amplitude mask is used to remove the information disclosure risk. This technique can be extended to other domains such as gyrator, Fourier, and Fractional Fourier.

Luo et al. [101] suggested a encryption architecture using Integer Wavelet Transform (IWT). In this architecture, the decomposition process is done through IWT to divide input image into approximation and detail coefficients. The approximation coefficients are diffused using spatiotemporal chaos. Then, the diffused image is obtained by inverse IWT. The permutation process is performed to reduce the correlation among pixels using logistic map to get an encrypted image.

Mehra and Nishchal [14] used the combination of GT and WT to protect the phase images. The secret key is created by different random phase codes as well as parameters of GT and WT. Therefore, the developed secret key is stronger than the earlier techniques.

Kanso and Ghebleh [102] contributed in the field of visual image encryption by implementing embedded process in lift wavelet transform. It enhances the security of encryption techniques and quality of resultant images.

Lima et al. [103] suggested the use of Cosine Number Transform (CNT) for medical images encryption. The technique is used to avoid round-off errors and maintain high quality of images. It divides the image into blocks. Then, each block is sequentially applied to CNT. The encrypted image is obtained when whole image is processed.

Wu et al. [104] used Reality-Preserving Fractional Discrete Cosine Transform (RPFrDCT) to encrypt the color images. The encrypted image of this technique is a single color image. Therefore, it is convenient for storage and transmission.

Yaru and Jianhua [105] proposed an image encryption algorithm based on FrDCT via polynomial interpolation (PI-FrDCT), and Dependent Scrambling and Diffusion (DSD) process. Sinusoidal chaotic map is used to generate the pseudo-random sequence which is utilized by PI-FrDCT to encrypt the images. The coefficients of PI-FrDCT are also limited by sigmoid function. DSD is applied to generate an encrypted image.

Table 8 Comparison between transform based image encryption techniques

Table 8 shows the comparison of Fourier, Fresnel, wavelet and cosine transforms based image encryption techniques. Transform based image encryption techniques have significant encryption speed. However, these techniques do not satisfy differential analysis efficiently.

3.3 Compressive Sensing Based Image Encryption Techniques

According to the Nyquist theorem, the signal is sampled at a least twice rate of its highest frequency to represent the signal without any error [107]. However, we often compress the data soon after sensing. It is wastage of valuable sensing resources. Over the past few years, a new theory of “Compressive Sensing” (CS) has emerged. In this technique, the signal is sampled and compressed simultaneously which reduce the rate at a great extent.

CS theory asserts that one can recover certain signals and images from fewer samples or measurements than the traditional techniques. CS relies on two principles namely, sparsity and incoherence. Sparsity pertains to the signals of interest and incoherence pertains to the sensing modality [107].

In image encryption, CS has a significant contribution because encryption and compression can be applied at the same time to protect the sensitive images with storage reduction. Encryption is performed during sampling process. CS can be implemented with chaos and optical domain to improve the security [108]. Figure 11 shows the image encryption using compressive sensing and chaotic map.

Fig. 11
figure 11

Image encryption using compressive sensing

Zhang et al. [109] demonstrated that CS has the ability to improve the speed of image cryptosystems. CS-based cryptosystems reduce the unwanted data in the plain image, then encryption process is used to encrypt the compressed image. Lu et al. [110] utilized an image encryption technique using CS and random phase based cryptography. A plain image is encrypted using CS technique and then random projection and dimensional reduction are used to encrypt the image. Zhou et al. [111] demonstrated a cryptography technique by utilizing encryption and CS concurrently. Partial Hadamard patterns are employed to encrypt the input image which are guarded by Chaos maps. This technique can handle several attacks. Zhou et al. [112] integrated CS with Nonlinear-Fractional Mellin Transform (NFMT). CS reduces the amount of data in the plain image. NFMT is utilized to encrypt the image. The frequency patterns are guided by chaos maps. This technique provides more secured image than the existing CS based encryption techniques.

Zhou et al. [113] utilized Discrete Fractional Random Technique (DFRT) and CS to encrypt a plain image. Two plain images are compressed and encrypted by utilizing CS and converted into the single image. The encrypted image is then re-encrypted by utilizing Arnold transform and DFRT. Zhou et al. [114] found that the several cryptography techniques based upon chaos maps suffer from several attacks. The encryption process is time-consuming in nature. To handle these issues, an improved cryptographic scheme is proposed by CS based hyper chaotic maps. It reduces the size of an image and provides better way for keys distribution.

Leihong et al. [115] shown that the most of image cryptographic systems suffer from low computational speed, especially when the size of input image is large. To overcome this issue, a cryptography technique by utilizing compressive ghost imaging with FFT is designed. This technique has high security, fast communication, and good quality of decrypted image. Rawat et al. [15] demonstrated an improved cryptography system based upon CS, Arnold transform, and structurally random patterns. It has good computational speed and improved the quality of decrypted image.

Cao et al. [17] implemented an image cryptosystem without embedding the secret image into a cover image. This technique used the coupled dictionary learning and CS. It can encrypt multiple images within one cover image. Zhang et al. [18] used sparse model with CS to encrypt and compress the images. In this technique, pixel scrambling technique is used to re-encrypt the compressed and encrypted image to enhance the security of algorithm against brute force attack, statistical analysis, and chosen plaintext attack.

Table 9 Performance comparison of compressive sensing based encryption techniques

The comparison of above studied image encryption techniques based on compressive sensing is shown in Table 9. It is observed that compressive sensing based image encryption techniques have better computational speed. However, these techniques do not provide significant entropy of encrypted/decrypted images. Thus, these are not effective against differential attacks.

3.4 3D Image Encryption Techniques

Integral imaging is a well-known 3D image encryption technique. It receives more attention from researchers as it provides high robustness, security, and has good computational speed [106]. This technique produces an elemental image array (EIA) obtained from optical pinhole (or a lenslet) array [116]. Every elemental image has its own perspective decomposing whole information of a 3D image and can be reconstructed by using partial information even if some pixels of an encrypted image can be lost by possible number of attacks. Therefore, it is more efficient against various security attacks [95].

The conventional II system contain two optical processes i.e., pickup and display processes (see Fig. 12a, b). The lenslet array has been implemented in both processes to reconstruct 3D images [117]. From Fig. 12, it has been demonstrated that the rays information projecting from the 3D image is passing through the lenslet array and develop a set of elemental images (EIs) with different perspective information; and these EIs called as EIA are evaluated by a charge-coupled device (CCD) [118].

Fig. 12
figure 12

The integral imaging system: a pickup process, b display process [118]

In the case of display, the evaluated EIA is shown on display panel and merged by the lens array into a 3D image at similar distance. But, according to the conventional optical II, the performance of reconstructed Image is degraded because of the diffraction and constraints of physical devices.

Fig. 13
figure 13

The pickup process of computer-generated integral imaging system [118]

To handle these issues, the computational integral-imaging(CII) is designed. From Fig. 13, it has been demonstrated that the CII reconstructs by a computer using EIs that were selected using an optical lenslet array and CCD. The computational integral-imaging reconstruction (CIIR) is a volumetric technique that utilizes entire set of EIs’s information to reconstruct a set of \(3\hbox {D}\) plane images by considering the arbitrary distance. The quality of images obtained by CIIR has better performance as compared to optical II [119]. Because, CIIR is free of diffraction and device constraints. However, in optical pickup process of CII system suffers from the optical diffraction and constraints of physical devices [120].

3.5 Optical Image Encryption Techniques

Optical encryption techniques have been extensively utilized in the field of image cryptography because of their faster computational speed, parallel processing, and information storage in different dimensions [121]. The most important optical encryption technique is Double Random Phase Encoding (DRPE) [120]. It has opened new fields of research in optical image and signal processing. Figure 14 depicts the image encryption process of DRPE technique. It uses two random phase diffusers D1 and D2 both in space and frequency domains, respectively. An input image passes through D1 and then 2D optical Fourier transform (OFT). Again, image passes through D2 and then finally second 2D OFT. The encrypted image generated through DRPE technique looks like stationary white noise due to the statistical properties of diffusers. As D1 makes the input image white, while D2 makes the image stationary and encrypted.

Fig. 14
figure 14

Image encryption using DRPE technique [120]

A number of optical image encryption techniques has been proposed in the literature based on DRPE system.

Ding and Chen [122] presented the optical color image cryptosystem using position multiplexing technique and phase truncation operation. The color image is encrypted in the single spatial channel instead of three channels. It also maintains non-linear characteristics of encryption process. This cryptosystem resists iterative attack.

Qin and Gong [121] used lateral shift multiplexing to implement the multiple-image encryption. This scheme has addressed the silhouette problem of interference domain in very efficient way. Three POMs are used to encrypt the multiple images. The decryption process captures the plain images at output plane and secret key with the process of lateral shifting. Wang et al. [123] applied reverse engineering on modified amplitude-phase retrieval based algorithm for optical image encryption. This scheme shows the fake image instead of a noisy image after the encryption process that will help to protect the information

Chen et al. [124] used the concept of multi-beams interference with vector composition to encrypt the optical images. The ingenious technique is used to create n phase masks which are used as encryption keys. The ciphered image is obtained by multi-beams interference and vector composition. The original image is retrieved at receiver end by illuminating n-beams at POMs at the output plane after Fourier transform. Chen et al. [125] invented a technique to create color-ciphertext of a gray image by using Common Vector Composition (CVC) technique and three-beam interference technique. CVC technique breaks an original gray image into three parts of amplitude and phase information. These are used to generate colored ciphertext. The three-beam interference is used to retrieve the gray image from colored ciphertext.

Deng and Wen [126] applied fully phase encoding to implement the multiple- image encryption. This technique overcomes the problems of cross-talk noise, encryption capacity, and iterative computation. The simple interference technique is used to recover all deciphered images. Zhao et al. [127] added the feature of information authentication in image encryption using fingerprint as a secret key. The encryption algorithm is implemented using phase retrieval distribution and RSA algorithm. Wang et al. [128] tried to reduce the number of iterations in image encryption using improved amplitude-phase retrieval algorithm. It enhances the encryption capacity and the computation time.

Chen [129] used three-dimensional space for optical multiple-vision cryptography. Each input image is decomposed into a series of particle-like points distributed in 3-D space, and all generated particle-like points are encrypted in POM.

Table 10 Comparative analysis based upon optical techniques

Table 10 shows the performance comparison between optical domain based image encryption techniques. From the table, it has been observed that these techniques do not provide significant results against differential and statistical attacks.

Table 11 summarizes the pros and cons of well-known image encryption techniques.

Table 11 Pros and cons of existing image encryption techniques

4 Performance Comparison of Encryption Techniques Based on Image Quality Measures

The researchers have focused on the security analysis rather than the quality of encrypted and decrypted images. Image encryption techniques may introduce some amount of distortion or artifacts in the decrypted images, which negatively impacts the user’s perception. The assurance of decrypted image quality is an important task for content providers and network operators. Therefore, the image quality metrics are performed to describe the quality of decrypted images. These measures evaluate the relationship between input and decrypted images.

Table 12 Comparison of image encryption techniques based upon quality metrics

The well-known image quality measures are BCR, PSNR, MSE, SDR, SSIM, RE, MAE, and SNR. Table 12 shows the performance comparison of image encryption techniques based on the above-mentioned quality metrics. Here, ✓ indicates that the given technique uses the corresponding metric to evaluate the performance of image encryption. In the same way, ✗ states that the given technique did not consider the respective metric for their performance evaluation.

5 Performance Analysis

This section describes the performance analysis of the image encryption techniques. To compare the existing image encryption techniques well-known “lena image” has been considered. In case of color images, we have taken the mean values of each parameter. Table 13 shows the performance analysis of some well-known image encryption techniques by considering the NPCR, UACI, Diagonal correlation (Diag. Corr.), Vertical correlation (Verti. Corr.), Horizontal correlation (Hori. Corr.), Entropy and Key size.Table 14 shows the execution time of various existing image encryption techniques.

Table 13 Comparative analysis of image encryption techniques
Table 14 Computational speed analysis of image encryption techniques

6 Cryptanalysis on Image Encryption Techniques

In cryptanalysis, the cryptanalyst knows everything about cryptosystem except secret key. Cryptanalyst launch different types of attacks on cryptosystem to explore relation between plaintext and ciphertext to recover the secret key. The different types of attacks are ciphertext only, known plaintext, chosen plaintext, and chosen ciphertext. The various secure image encryption techniques have been broken by cryptanalysts. They suggest further improvements in encryption technique to enhance their security.

Wang and He [159] cryptanalysed Zhang and Liu [160] image encryption technique using chosen-plaintext attack. It was observed that the plain image can be retrieved without knowing the secret key. An image encryption technique that uses both skew tent and hyper chaotic maps proposed by Kadir et al. [33]. This technique cryptanalysed by [161]. The complete keystream can be retrieved through chosen-plaintext attack. Murillo et al. [162] implemented an image encryption technique that was dependent on the plain image. However, this technique was cracked by Fan et al. [163] using known/chosen plaintext attacks.

Zeng et al. [164] broke Li et al. [165] image encryption technique by launching chosen-plaintext and known-plaintext attacks. The security of broken technique can be improved through dynamic permutation process.

Su et al. [166] revealed that the image cryptosystem designed by [167] using chaos and DNA is susceptible to chosen-plaintext attack. Authors suggested that the technique can be improved by replacing the entropy present in chaos system with hash function.

Zhang et al. [168] used chosen-plaintext attack to break the encryption algorithm proposed by [169]. To improve the security, they proposed a modification in keystream of [169]. Norouzi and Mirzakuchaki [170] revealed that Zhao et al. [171] image encryption technique suffers from weak secret key. The keystream of [171] does not depend on the plain-image. Therefore, the secret key can be easily recovered using the chosen-plaintext attack. Table 15 shows the cryptanalysis of existing image encryption techniques.

Table 15 Cryptanalysis of image encryption techniques

It can be observed from the cryptanalysis that chaotic map based image encryption techniques can be broken easily. There is need to replace the chaotic map with another method which can provide more security. So, it is still an challenging issue to make chaotic map more secure.

7 Applications of Image Encryption

Image encryption techniques are widely used in various computer vision based applications. Table 16 shows various applications of image encryption techniques.

Table 16 Applications of image encryption techniques

8 Future Research Directions

It has been observed from literature that the development of an efficient image encryption technique is still an open area research. The existing image encryption techniques suffer from various issues such as poor computational speed, security flaws, parameter tuning, etc. Based upon these issues, the following future directions have been discussed below.

8.1 Transmission Process

During the transmission process, if the image is tampered by third party, the integrity and authenticity verification are very necessary to ensure the confidentiality of the image content. Therefore, the design of combined approach for encryption and authentication is more desirable in near future.

8.2 Image Compression

The image encryption technique undermines the correlation between pixels and reduces the compression ratio. Image compression technique not only reduces the amount of data transmitted but also reduces the amount of data. There is a possibility to combine both encryption and compression technique for better efficiency.

8.3 Constant Attributes

In the existing image encryption techniques, constant attributes usually remain unchanged which limits the performance of encryption. There is a possibility to change the constant parameters based on the given input image. Therefore, an efficient parameter tunning approach is desirable to improve the performance of encryption techniques.

8.4 Key Space

The size of key space in encryption process depends upon the key factor that directly affects the encrypted image. The image compression can be used to improve the weakness of key factor.

8.5 Meta-heuristic Technique

Recently, many researchers have used meta-heuristic techniques to further improve the performance of existing encryption techniques. However, these techniques also suffer from pre-mature convergence, poor convergence speed, stuck in local optima, etc. There is a possibility to select an efficient meta-heuristic technique to improve the performance of the existing image encryption techniques.

8.6 Parallel Processing

Now-a-days, size is becoming huge for medical and remotely sensed applications. Therefore, it becomes essential to use parallel processing in encryption to improve the computational speed.

9 Conclusion

This paper provides an extensive study of the existing image encryption techniques. This paper classifies the existing image encryption techniques in a concise and effective way. It has been observed that security flaws, parameters tuning, and computational speed are still an open area of research in the field of image encryption. To handle these issues, meta-heuristic based image encryption techniques have been designed by various researchers. The majority of existing meta-heuristic based image encryption techniques still suffer from poor convergence speed, premature convergence, and stuck in local optima. The challenges and future research directions associated with image encryption techniques have been discussed. From the comprehensive review of existing image encryption techniques, it has been concluded that an image encryption is still an underdeveloped field. It is largely unexplored in various imaging systems such as underwater, remote sensing, multi-spectral imaging, and \(3\hbox {D}\) imaging systems.