Comparative evaluations of image encryption algorithms