1 |
J. Li, H. Liu, "Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map," IET information security, 7(4), pp. 265-270, 2013.
DOI
|
2 |
Q. Zhang, Q. Ding, "Digital image encryption based on advanced encryption standard (aes)," in Proc. of Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015 Fifth International Conference on, pp. 1218-1221, IEEE, 2015.
|
3 |
J. Daemen, V. Rijmen. "Aes proposal: Rijndael," 1999.
|
4 |
G. Chen, Y. Mao, C. K. Chui. "A symmetric image encryption scheme based on 3d chaotic cat maps," Chaos, Solitons & Fractals, 21(3), pp. 749-761, 2004.
DOI
|
5 |
N. B. Slimane, K. Bouallegue, M. Machhout, "Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm sha-1," in Proc. of Control Engineering & Information Technology (CEIT), 2016 4th International Conference on, pp. 1-5, IEEE, 2016.
|
6 |
Y. Abanda, A. Tiedeu, "Image encryption by chaos mixing," IET Image Processing, 10(10), pp. 742-750, 2016.
DOI
|
7 |
L. Liu, S. Miao, H. Hu, M. Cheng, "N-phase logistic chaotic sequence and its application for image encryption," IET Signal Processing, 10(9), pp. 1096-1104, 2016.
DOI
|
8 |
H. Huang, S. Yang, "Colour image encryption based on logistic mapping and double random-phase encoding," IET Image Processing, 11(4), pp. 211-216, 2016.
DOI
|
9 |
H. Liu, A. Kadir, X. Sun, "Chaos-based fast colour image encryption scheme with true random number keys from environmental noise," IET Image Processing, 11(5), pp. 324-332, 2017.
DOI
|
10 |
M. Boussif, N. Aloui, A. Cherif, "Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition," IET Image Processing, 11(11), pp. 1020-1026, 2017.
DOI
|
11 |
S. S. Maniccam, N. Bourbakis, "Lossless image compression and encryption using scan," Pattern Recognition, 34, pp. 1229-1245, 2001.
DOI
|
12 |
J. I. Guo, J. C. Yen. "A new chaotic mirror-like image encryption algorithm and its VLSI architecture," Pattern Recognition and Image Analysis, 10(2), pp. 236-247, 2000.
|
13 |
Manju Kumari, Shailender Gupta, Pranshul Sardana. "A Survey of Image Encryption Algorithms". 3D Research, 2017(8): 1-35.
|
14 |
A. Sinha, K. Singh, "A technique for image encryption using digital signature," Optics Communications, 218(2203), pp. 229-234, 2003.
DOI
|
15 |
R. Matthews, "On the derivation of a 'chaotic' encryption algorithm", Cryptologia, 13(1), pp. 29-42, 1989.
DOI
|
16 |
H. Gao, Y. Zhang, S. Liang, D. Li, "A new chaotic algorithm for image encryption," Chaos, Solitons & Fractals, 29(2), pp. 393-399, 2006.
DOI
|
17 |
N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption using chaotic logistic map," Image and vision computing, 24(9), pp. 926-934, 2006.
DOI
|
18 |
W. Wei, J. Cong, "Image encryption scheme for android mobile platform," Computer Science, 1(8), pp. 94-96, 2014.
|
19 |
V. Patidar, N. Pareek, G. Purohit, K. Sud, "Modified substitution-diffusion image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, 15(10), pp. 2755-2765, 2010.
DOI
|
20 |
J. W. Yoon, H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulation, 15(12), pp. 3998-4006, 2010.
DOI
|
21 |
P. Praveenkumar, R. Nisha, K. Thenmozhi, J. B. B. Rayappan, R. Amirtharajan, "Image merger encryptor: A chaotic and chebyshev key approach," Research Journal of Information Technology, 2016.
|
22 |
Nanrun Zhou, Haolin Li, Di Wang, Shumin Pan, Zhihong Zhou, "Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform," Optics Communications, 343, 10-21, 2015.
DOI
|
23 |
M. J. Rostami, A. Shahba, S. Saryazdi, H. Nezamabadi-pour, "A novel parallel image encryption with chaotic windows based on logistic map," Computers & Electrical Engineering, 2017.
|
24 |
C. Pak, L. Huang, "A new color image encryption using combination of the 1d chaotic map," Signal Processing, 138, pp. 129-137, 2017.
DOI
|
25 |
L. Kocarev, "Chaos-based cryptography: a brief overview," IEEE Circuits &Systems Magazine, 1(3), pp. 6-21, 2001.
DOI
|
26 |
Xinpeng Zhang, "Separable Reversible Data Hiding in Encrypted Image," IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, 2014.
|
27 |
Nanrun Zhou, Shumin Pan, Shan Cheng, Zhihong Zhou, "Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing," Optics and Laser Technology, 82: 121-133, 2016.
DOI
|
28 |
L. H. Gong, X. B. Liu, F. Zheng, N. R. Zhou, "Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique," Journal of Modern Optics, 60(13): 1074-1082, 2013.
DOI
|
29 |
Y. Wu, Y. Zhou, J.P. Noonan, S.Agaian, "Design of image cipher using Latin squares," Information Sciences, 264: 317-339, 2014.
DOI
|
30 |
Chuan Qin, Zhihong He, Xiangyang Luo, Jing Dong, "Reversible data hiding in encrypted image with separable capability and high embedding capacity," Information Sciences, 465: 285-304, 2018.
DOI
|
31 |
Chuan Qin, Xinpeng Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," J. Vis. Commun. Image R. 31, 154-164, 2015.
DOI
|