[1]
|
Z. Guan, F. Huang and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letters A, Vol. 346, No. 1-3, 2005, pp. 153-157.
doi:10.1016/j.physleta.2005.08.006
|
[2]
|
H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen and Y. Y. Tuan, “Digital Color Image Encoding and Decoding Using a Novel Chaotic Random Generator,” Chaos Solitons and Fractals, Vol. 32, No. 3, 2005, pp. 1070-1080. doi:10.1016/j.chaos.2005.11.057
|
[3]
|
Q. Alsafasfeh and A. Alshabatat, “Image Encryption Based on Synchronized Communication Chaotic Circuit,” Journal of Applied Sciences Research, Vol. 7, No. 4, 2011, pp. 392-399.
|
[4]
|
H. Gao, Y. Zhang, S. Liang and D. Li, “A New Chaotic Algorithm for Image Encryption,” Chaos Solitons and Fractals, Vol. 29, No. 2, 2006, pp. 393-399.
doi:10.1016/j.chaos.2005.08.110
|
[5]
|
C. Fu, Z. Zhang and Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” Third International Conference on Natural Computation, Vol. 3, Washington, 2007, pp. 24-27.
|
[6]
|
L. Zhang, X. Liao and X. Wang, “An Image Encryption Approach Based on Chaotic Maps,” Chaos Solitons and Fractals, Vol. 24, No. 3, 2005, pp. 759-765.
doi:10.1016/j.chaos.2004.09.035
|
[7]
|
S. Bu and B. Wang, “Improving the Security of Chaotic Encryption by Using a Simple Modulating Method,” Chaos Solitons and Fractals, Vol. 19, No. 4, 2003, pp. 919-924. doi:10.1016/S0960-0779(03)00260-1
|
[8]
|
X. Wu, H. Hu and B. Zhang, “Analyzing and Improving a Chaotic Encryption Method,” Chaos Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 367-373.
doi:10.1016/j.chaos.2004.02.009
|
[9]
|
G. Chen, Y. Mao and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons and Fractals, Vol. 21, No. 3, 2003, pp. 749-761. doi:10.1016/j.chaos.2003.12.022
|
[10]
|
F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “A New Chaotic Algorithm for Video Encryption,” IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, 2002, pp. 838-844.
doi:10.1109/TCE.2003.1196410
|
[11]
|
K. Wong, B. Kwok and W. Law, “A Fast Image Encryption Scheme Based on Chaotic Standard Map,” City University of Hong Kong, Hong Kong.
|
[12]
|
L. Wang, Q. Ye, Y. Xiao, Y. Zou and B. Zhang, “An Image Encryption Scheme Based on Cross Chaotic Map,” Congress on Image and Signal Processing, Sanya, 27-30 May 2008, pp. 27-26.
|
[13]
|
Q. Alsafasfeh and M. Alarni, “A New Chaotic Attractor from Lorenz and Rossler Systems and Its Electronic Experimental Implementation,” Circuits and Systems, Vol. 2, No. 2, 2011, pp. 101-105. doi:10.4236/cs.2011.22015
|
[14]
|
T. Ga and Z. Chen, “Image Encryption Based on a New Total Shuffling Algorithm,” Chaos Solitons & Fractals, Vol. 38, No. 1, 2008, pp. 213-220.
doi:10.1016/j.chaos.2006.11.009
|
[15]
|
N. K. Pareek, V. Patidar and K. K. Sud, “Image Encryption Using Chaotic Logistic Map,” Image and Vision Computing, Vol. 24, No. 9, 2006, pp. 926-934.
doi:10.1016/j.imavis.2006.02.021
|
[16]
|
V. Patidar, N. K. Pareek and K. K. Sud, “A New Substitution-Diffusion Based Image Encrypete Using Chaotic Standard and Logistic Maps,” Communications in Non-Linear Science and Numerical Simulation, Vol. 14, No. 7, 2009, pp. 3056-3075. doi:10.1016/j.cnsns.2008.11.005
|