References
- G. Ye and K. W. Wong, "An efficient chaotic image encryption algorithm based on a generalized Arnold map," Nonlinear Dynamics, vol. 69, no. 4, pp. 2079-2087, Sep. 2012 https://doi.org/10.1007/s11071-012-0409-z
- A. A. A. El-Latif, L. Li, T. Zhang, N. Wang, X. Song and X. Niu, "Digital image encryption scheme based on multiple chaotic systems," Sensing and Imaging, vol. 13, no. 2, pp. 67-88, Jun. 2012 https://doi.org/10.1007/s11220-012-0071-z
- S. Sam, P. Devaraj and R. S. Bhuvaneswaran, "A novel image cipher based on a mixed transformed logistic maps," Multimedia Tools and Applications, vol. 56, no. 2, pp. 315-330, Jan. 2012 https://doi.org/10.1007/s11042-010-0652-6
- M. Francois, T. Grosges, D. Barchiesi and R. Erra, "A new image encryption scheme based on a chaotic function," Signal Processing: Image Communications, vol. 27, no. 3, pp. 249-259, Mar. 2012 https://doi.org/10.1016/j.image.2011.11.003
- N. Taneja, B. Raman and I. Gupta, "Combinational domain encryption for still visual data," Multimedia Tools and Applications, vol. 159, no. 3, pp. 775-793, Aug. 2012
- S. Sam, P. Devaraj and R. S. Bhuvaneswaran, "An intertwining chaotic maps based image encryption scheme," Nonlinear Dynamics, vol. 69, no. 4, pp. 1995-2007, Sep. 2012 https://doi.org/10.1007/s11071-012-0402-6
- X. Huang, "Image encryption algorithm using chaotic chebyshev generator," Nonlinear Dynamics, vol. 67, no. 4, pp. 2411-2417, Mar. 2011
- X. Liao, S. Lai and Q. Zhou, "A novel image encryption algorithm based on self-adaptive wave transmission," Signal processing, vol. 90, no. 9, pp. 2714-2722, Sep. 2010 https://doi.org/10.1016/j.sigpro.2010.03.022
- A. A. A. El-Latif, L. Li and X. Niu, "A new image encryption scheme based on cyclic elliptic curve and chaotic system," Multimedia Tools and Applications, vol. 70, no. 3, pp. 1559-1584, Jun. 2014 https://doi.org/10.1007/s11042-012-1173-2
- C. K. Huang, C. W. Liao, S. L. Hsu and Y. C. Jeng, "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system," Telecommunication Systems, vol. 52, no. 2, pp. 563-571, Feb. 2013
- J. W. Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 12, pp. 3998-4006, Dec. 2010 https://doi.org/10.1016/j.cnsns.2010.01.041
- A. Akhshani, S. Behnia, A. Akhavan, H. AbuHassan and Z. Hassan, "A novel scheme for image encryption based on 2D piecewise chaotic maps," Optics Communications, vol. 283, no.17, pp. 3259-3266, Sep. 2010 https://doi.org/10.1016/j.optcom.2010.04.056
- G. Ye, "Image scrambling encryption algorithm of pixel bit based on chao map," Pattern Recognition Letters, vol. 31, no. 5, pp. 347-354, Apr. 2010 https://doi.org/10.1016/j.patrec.2009.11.008
- G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, Aug. 2006 https://doi.org/10.1142/S0218127406015970
- V. Patidar, N. K. Pareek and K. K. Sud, "A new substitution diffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 7, pp. 3056-3075, Jul. 2009 https://doi.org/10.1016/j.cnsns.2008.11.005
- N. K. Pareek, V. Patidar and K. K. Sud, "Image encryption using chaotic logistic map," Image Vision and computing, vol. 24, no. 9, pp. 926-934, Sep. 2006 https://doi.org/10.1016/j.imavis.2006.02.021
- B. schneier, Applied cryptography. Singapore: John Wiley & sons, 2001