Research Article

An Unequal Image Privacy Protection Method Based on Saliency Detection

Table 5

Summary and comparison of the current encryption algorithms.

AlgorithmsEncryption typesAlgorithms usedAdvantagesLimitations

Chen et al. [17]Full encryptionSelf-adaptive permutation-diffusion and DNA random encodingEnhancing the plaintext attack resistanceConsuming much time and requiring high computation

Wen et al. [41]Full encryptionDNA sequences and chaotic systemsEnough security to protect imageComplexity and requiring high computation

Wang et al. [42]Selective encryptionCompressed sensing and data hidingDegrading the visual quality level and saving computationThe visual information in image may have security issue

Khan and Ahmad [43]Selective encryptionChaotic systemLower overhead and more efficiency2D map system may not get enough security

ProposedUnequal encryptionDNA sequences and compressed sensingSaving computation and storageIncreasing the execution speed