[1]
|
S. Lian, “A Block Cipher Based on Chaotic Neural Networks,” Neurocomputing, Vol. 72, No. 4-6, 2009, pp. 1296-1301. doi:10.1016/j.neucom.2008.11.005
|
[2]
|
R. Matthews, “On the Derivation of a chaotic Encryption Algorithm,” Cryptologia, Vol. 13, No. 1, 1989, pp. 29-42.
doi:10.1080/0161-118991863745
|
[3]
|
Z. Li and D. Xu, “A Secure Communication Scheme Using Projective Chaos Synchronization,” Chaos, Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 477-481.
doi:10.1016/j.chaos.2004.02.019
|
[4]
|
F.-Y. Wang and G.-W. Cui, “A New Image Encryption Algorithm Based on the Logistic Chaotic System,” The 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu, 9-11 July 2010, pp. 192-194.
|
[5]
|
C. M. Li and L. X. Hong, “A New Image Encryption Scheme Based on Hyperchaotic Sequences,” IEEE International Workshop on Anti-Counterfeiting, Security, Identification, Xiamen, 16-18 April 2007, pp. 237-240.
|
[6]
|
Y. Cheng, S. Yang and S.-F. Li, “Image Encryption of Multiple Keys Method Based on Chaotic Maps,” First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), Harbin, 17-19 September 2010, pp. 891-894. doi:10.1109/PCSPA.2010.220
|
[7]
|
M. Ashtiyani, P. M. Birgani and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography,” The 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, 7-11 April 2008, pp. 1-5.
|
[8]
|
M. Ahmad, C. Gupta and A. Varshney, “Digital Image Encryption Based on Chaotic Map for Secure Transmission,” International Multimedia Signal Processing and Communication Technologies, Aligarh, 14-16 March 2009, pp. 292-295. doi:10.1109/MSPCT.2009.5164233
|
[9]
|
D. Socek, S. Li, S. S. Magliveras and B. Furht, “Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption,” First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 5-9 September 2005, pp. 406-407.
|
[10]
|
G. Alvarez, F. Montoya, M. Romera and G Pastor, “Cryptanalysis of an Ergodic Chaotic Cipher,” Physics Letters A, Vol. 311, No. 2-3, 2003, pp. 172-179.
doi:10.1016/S0375-9601(03)00469-9
|
[11]
|
A. Awad, S. E. Assad, Q. Wang, C. Vladeanu and B. Bakhache, “Comparative Study of 1-D Chaotic Generators for Digital Data Encryption,” International Journal of Computer Science, Vol. 35, No. 4, 2008, pp. 483-488.
|
[12]
|
A. Awad, “A New Chaos-Based Cryptosystem for Secure Transmitted Images,” IEEE Transactions on Computers, No. 99, 2011, p. 1.
|
[13]
|
C. X. Zhu, Z. G. Chen and W. W. Ouyang, “A New Image Encryption Algorithm Based on General Chen’s Chaotic System,” Journal of Central South University of Technology, Vol. 37, No. 6, 2006, pp. 1142-1148.
|
[14]
|
C. K. Huang and H. H. Nein, “Multi Chaotic Systems Based Pixel Shuffle for Image Encryption,” Optics Communication, Vol. 282, No. 11, 2009, pp. 2123-2127
|
[15]
|
A. Abid, Q. Nasir and A. Elwakil, “Implementation of an Encrypted Wireless Communication System Using Nested Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 20, No. 12, 2010, pp. 4087-4096.
doi:10.1142/S0218127410027957
|
[16]
|
S. Li, G. Chen and X. Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, 2005, pp. 3119-3151. doi:10.1142/S0218127405014052
|
[17]
|
T. Addabbo, M. Alioto, A. Fort, S. Rocchi and V. Vignoli, “A Feedback Strategy to Improve the Entropy of a Chaos-Based Random Bit Generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, 2006, pp. 326-337. doi:10.1109/TCSI.2005.856670
|
[18]
|
M. Drutarovsky and P. Galajda, “Chaos-Based True Random Number Generator Embedded in a Mixed-Signal Reconfigurable Hardware,” Journal of Electrical Engineering, Vol. 57, No. 4, 2006, pp. 218-225.
|
[19]
|
A. M. Abid, “An Implementation of Chaotic Encryption in Wireless Voice Transmission,” M.Sc. Thesis, University of Sharjah, Sharjah, 2009.
|