1 |
Guanrong Chen, Yaobin Mao, and Charles K. Chui’ “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos solitons and fractals, vol. 21 no. 3, 2004, pp. 749-761.
DOI
|
2 |
Lequan Min and Guanrong Chen, “A novel stream encryption scheme with avalanche effect,” The European Physical Journal B, vol. 86, 2013, p. 459.
DOI
|
3 |
D. Chattopadhyay, M. K. Mandal, and D. Nandi, “Symmetric key chaotic image encryption using circle map,” Indian Journal of Science and Technology, vol. 4, 2010, pp. 593-599.
|
4 |
A Akhshani, S Behnia, A Akhavan, H Abu Hassan, and Z Hassan, “A novel scheme for image encryption based on 2D piecewise chaotic maps,” Optics Communications, vol. 283, no. 17, 2010, pp. 3259-3266.
DOI
|
5 |
Guodong Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, 2010, pp. 347-354.
DOI
|
6 |
Gonzalo Alvarez and Shujun Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, 2006, pp. 2129-2151.
DOI
|
7 |
V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution diffusion based image cipher using chaotic standard and Logistic maps,” Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 7, 2009, pp. 3056-3075.
DOI
|
8 |
Guodong Ye and Kwok Wo Wong, “An efficient chaotic image encryption algorithm based on a generalized Arnold map,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 2079-2087.
DOI
|
9 |
Ahmed A. Abd El-Latif, Li Li, Tiejun Zhang, Ning Wang, Xianhua Song, and Xiamu Niu, “Digital image encryption scheme based on multiple chaotic systems,” Sensing and Imaging, vol. 13, no. 2, 2012, pp. 67-88.
DOI
|
10 |
N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic Logistic map,” Image Vision and Computing, vol. 24, no. 9, 2006, pp. 926-934.
DOI
|
11 |
Bruce schneier, “Applied cryptography,” John Wiley & sons, 2001.
|
12 |
Xiaoling Huang, “Image encryption algorithm using chaotic Chebyshev generator,” Nonlinear Dynamics, vol. 67, no. 4, 2012, pp. 2411-2417.
DOI
|
13 |
Xiaofeng Liao, Shiyue Lai, and Qing Zhou, “A novel image encryption algorithm based on self-adaptive wave transmission,” Signal processing, vol. 90, no. 9, 2010, pp. 2714-2722.
DOI
|
14 |
Shantheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, “An intertwining chaotic maps based image encryption scheme,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 1995-2007.
DOI
|
15 |
Shatheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, "A novel image cipher based on mixed transformed logistic maps," Multimedia Tools and Applications, vol. 56, no. 2, 2012, pp. 315-330.
DOI
|
16 |
M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Processing: Image Communications, vol. 27, no. 3, 2012, pp. 249-259.
DOI
|
17 |
Nidhi Taneja, Balasubramanian Raman, Indra Gupta, “Combinational domain encryption for still visual data,” Multimedia Tools and Applications, vol. 159, no. 3, 2012, pp. 775-793.
DOI
|