Research Article
An Unequal Image Privacy Protection Method Based on Saliency Detection
Table 5
Summary and comparison of the current encryption algorithms.
| Algorithms | Encryption types | Algorithms used | Advantages | Limitations |
| Chen et al. [17] | Full encryption | Self-adaptive permutation-diffusion and DNA random encoding | Enhancing the plaintext attack resistance | Consuming much time and requiring high computation |
| Wen et al. [41] | Full encryption | DNA sequences and chaotic systems | Enough security to protect image | Complexity and requiring high computation |
| Wang et al. [42] | Selective encryption | Compressed sensing and data hiding | Degrading the visual quality level and saving computation | The visual information in image may have security issue |
| Khan and Ahmad [43] | Selective encryption | Chaotic system | Lower overhead and more efficiency | 2D map system may not get enough security |
| Proposed | Unequal encryption | DNA sequences and compressed sensing | Saving computation and storage | Increasing the execution speed |
|
|