References
- Vaibhav B Joshi and Mehul S Raval, "An Improved Commutative Reversible Watermarking and Encryption for Fingerprint Image." September. 2019. URL:https://osf.io/kvxah/download
- KiHwan Kim, HyeongRag Kim, HoonJae Lee, Young-Jae Ryu, “Analysis of Noise Sensitivity due to Image Wireless Transmission,” Journal of the Korea Institute of Information and Communication Engineering(JKIICE), Vol. 22, No. 1, pp. 211-220, January 2018. DOI: https://doi.org/10.6109/jkiice.2018.22.1.211
- Amandeep Singh, Praveen Agarwal and Mehar Chand, "Image Encryption and Analysis using Dynamic AES," IEEE. 2019 5th International Conference on Optimization and Applications (ICOA), April 2019. DOI: 10.1109/ICOA.2019.8727711
- Yong Zhang, "Test and verification of AES used for image encryption," 3D Research, Vol. 9, No. 3, pp. 1, March 2018. DOI: 10.1007/s13319-017-0154-7
- Yuqin Lue, Jin Yu, Wenrui Lai, Lingfeng Liu, "A novel chaotic image encryption algorithm based on improved baker map and logistic map," Multimedia Tools and Applications, pp.1-21, April 2019. DIO: 10.1109/ICCSIT.2010.5564894
- Vinod Patidar, N.K. Pareek, G. Purohit, K.K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," ELSEVIER.
- Shuqin Zhu, Congxu Zhu and Wenhong Wang, "A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256," Entropy, Vol.20, No.9, September 2018. DOI: 10.3390/e20090716
- Amna Shifa, Muhammad S. Afgan, Mamoona N. Asghar, Martin Fleury, Imran Memon, Saima Abdullah AND Nadia Rasheed, "Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering," IEEE Access, Vol. 6, pp.16189-16206, March 2018. DOI: 10.1109/ACCESS.2018.2815037
- El-Habib Bensikaddour, Youcef Bentoutou and Nasreddine Taleb, "Satellite image encryption method based on AES-CTR algorithm and GEFFE generator." 2017 8th International Conference on Recent Advances in Space Technologies (RAST), IEEE, June 2017. DOI: 10.1109/RAST.2017.8002953
- Ki-Hwan Kim and HoonJae Lee. "Proposal of multi-channel operation technique using PingPong256." 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), September 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00222
- Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray and San Vo, "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, 2001.
- Shi Liu, Changliang Guo and John T.Sheridan, "A review of optical image encryption techniques." Optics & Laser Technology, Vol. 57, pp. 327-342, April 2014. DOI: 10.1016/j.optlastec.2013.05.023
- Lu Xu, Zhi Li, Jian Li and Wei Hua, "A novel bit-level image encryption algorithm based on chaotic maps," Opt. Lasers Eng, Vol. 78, pp. 17-25, March 2016. DOI: 10.1016/j.optlaseng.2015.09.007
- Xing-Yuan Wang, Ying-Qian Zhang and Xue-Mei Bao, "A novel chaotic image encryption scheme using DNA sequence operations," Opt. Lasers Eng. Vol. 73, pp. 53-61, October 2015. DOI:10.1016/j.optlaseng.2015.03.022
- Ting Hu, Ye Liu, Li-Hua Gong and Chun-Juan Ouyang, "An image encryption scheme combining chaos with cycle operation for DNA sequences," Nonlinear Dyn, Vol. 87, pp. 51-66, August 2017. DOI: https://doi.org/10.1007/s11071-016-3024-6
- Ye Liu, Jun Wang, Jinghui Fan and Lihua Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimed. Tools Appl, Vol. 75, pp. 4363-4382, February 2015. DOI: https://doi.org/10.1007/s11042-015-2479-7
- Yue Wu, Joseph P. Noonan and Sos Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), Vol. 1, No. 2, pp. 31-38, April 2011. URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.390.2127&rep=rep1&type=pdf
Cited by
- 이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법 vol.24, pp.11, 2020, https://doi.org/10.6109/jkiice.2020.24.11.1507