This document reviews various techniques for encrypting digital images using chaotic systems. It begins by introducing chaos theory and its application to cryptography. It then reviews 25 research papers published between 2014-2020 that proposed different chaotic map-based techniques for image encryption. These techniques are evaluated and compared based on security metrics like key space, differential analysis, and histogram analysis. While the reviewed techniques demonstrated good encryption performance, the document also identifies potential weaknesses like vulnerability to chosen-plaintext attacks in some methods. It concludes that combining multiple chaotic maps and dynamic algorithms can help develop more robust encryption systems.