1 |
Y. Wang, K. W. Wong, X. F. Liao, T. Xiang and G. R. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009.
DOI
|
2 |
C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M. Lau, C. K. Tse and H. F. Ma, "An efficient and secure medical image protection scheme based on chaotic maps," Computers in biology and medicine, vol. 43, no. 8, pp. 1000-1010, 2013.
DOI
|
3 |
N. K. Pareek, V. Patidar and K. K. Sud, "Cryptography using multiple one-dimensional chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 10, no. 7, pp. 715-723, 2005.
DOI
|
4 |
Q. Mao, C. C. Chang and H. L. Wu, "An image encryption scheme based on concatenated torus automorphisms," KSII Transactions on Internet & Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013.
DOI
|
5 |
K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, "A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption," KSII Transactions on Internet & Information Systems, vol. 9, no. 5, pp. 1938-1962, 2015.
DOI
|
6 |
Y. J. Liu and Y. Q. Zheng, "Adaptive robust fuzzy control for a class of uncertain chaotic systems," Nonlinear dynamics, vol. 57, no. 3, pp. 431-439, 2009.
DOI
|
7 |
C. Q. Wang, X. Zhang and Z. M. Zheng, "Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme," PLoS One, vol. 11, no. 2, pp. e0149173, 2016.
DOI
|
8 |
C. Q. Wang, X. Zhang and Z. M. Zheng, "A novel image encryption algorithm based on multiple chaotic systems and self-adaptive model," in Proc. of the 2015 International Conference on Communications, Signal Processing, and Systems, pp. 677-685, 2016.
|
9 |
O. Fatih, O. B. Ahmet and Y. Sirma, "Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 24, pp. 4946-4948, 2012.
DOI
|
10 |
D. Xiao, X. F. Liao, S. J. Deng, "A novel key agreement protocol based on chaotic maps," Information Sciences, vol. 177, no. 4, pp.1136-1142, 2007.
DOI
|
11 |
C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, "An extended chaotic maps-based key agreement protocol with user anonymity," Nonlinear Dynamics, vol. 69, no. 1, pp. 79-87, 2012.
DOI
|
12 |
B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion," Multimedia tools and applications, vol. 71, no. 3, pp. 1469-1497, 2014.
DOI
|
13 |
C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyper-chaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013.
DOI
|
14 |
C. Q. Wang, X. Zhang and Z. M. Zheng, "An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems," Multimedia Tools and Applications, pp. 1-27, 2016.
|
15 |
C. X. Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012.
DOI
|
16 |
C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyperchaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013.
DOI
|
17 |
Y. S. Zhang, D. Xiao, W. Y. Wen and M. Li, "Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Nonlinear Dynamics, vol. 76, no. 3, pp. 1645-1650, 2014.
DOI
|
18 |
E. Solak, C. Cokal, O. T. Yildiz and T. Biyikoglu, "Cryptanalysis of Fridrich's chaotic image encryption," International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405-1413, 2010.
DOI
|
19 |
Y. P. Hu, C. X. Zhu and Z. J. Wang, "An improved piecewise linear chaotic map based image encryption algorithm," The Scientific World Journal, pp. 1-7, 2014.
|
20 |
Y. T. Li, D. Xiao, S. J. Deng, Q. Han and G. Zhou, "Parallel Hash function construction based on chaotic maps with changeable parameters," Neural Computing and Applications, vol. 20, no. 8, pp. 1305-1312, 2011.
DOI
|
21 |
G. R. Chen, Y. B. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
DOI
|
22 |
T. G. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008.
DOI
|
23 |
G. Alvarez and S. J. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.
DOI
|
24 |
P. Ping, F. Xu and Z. J. Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, 2014.
DOI
|
25 |
X. Y. Wang and C. Q. Jin, "Image encryption using game of life permutation and PWLCM chaotic system," Optics Communications, vol. 285, no. 4, pp. 412-417, 2012.
DOI
|
26 |
R. J. Chen and J. L. Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007.
DOI
|
27 |
L. Y. Zhang, X. B. Hu, Y. S. Liu, K. W. Wong and J. Gan, "A chaotic image encryption scheme owning temp-value feedback," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 10, pp. 3653-3659, 2014.
DOI
|
28 |
C. Q. Wang, X. Zhang and Z. M. Zheng, "An efficient image encryption algorithm based on a novel chaotic map," Multimedia Tools and Applications, pp. 1-30, 2016.
|
29 |
V. Patidar, N. K. Pareek, G. Purohit and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331-4339, 2011.
DOI
|
30 |
X. L. Huang and G. D. Ye, "An efficient self-adaptive model for chaotic image encryption algorithm," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 12, pp. 4094-4104, 2014.
DOI
|
31 |
C. Q. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, pp. 203-210, 2016.
DOI
|
32 |
Z. X. Qian, H. Zhou, X. P. Zhang and W. M. Zhang, "Separable Reversible Data Hiding in Encrypted JPEG Bitstreams," IEEE Transactions on Dependable and Secure Computing, pp. 1-13, 2016.
|
33 |
Z. X. Qian, X. P. Zhang and S. Z. Wang, "Reversible data hiding in encrypted JPEG bitstream," IEEE transactions on multimedia, vol. 16, no. 5, pp. 1486-1491, 2014.
DOI
|