This document surveys various chaos encryption techniques for encrypting image data. It begins by explaining why traditional encryption techniques are unsuitable for images and how chaos encryption provides an effective solution. It then provides background on chaos theory and describes the general process of chaos-based image encryption. The document proceeds to summarize several specific chaos encryption algorithms proposed in other papers, evaluating aspects like key space, correlation coefficient, and resistance to attacks. It concludes that chaos encryption is an effective method for secure image encryption and multiple techniques can be combined to further increase security.