This document summarizes and evaluates 15 different color image encryption algorithms based on chaotic maps proposed between 2010-2014. It discusses the basic concepts of chaos theory and its relationship to cryptography. Each algorithm is analyzed in terms of its implementation, key management, security analysis, and how well it satisfies common cryptographic requirements. While each algorithm has strengths, the document concludes that finding a single technique that satisfies all requirements is impossible given the complexity of securely encrypting color images.