[1]
Gong-bin Q, Qing-feng J, Shui-sheng Q. A new image encryption scheme based on DES algorithm and Chua’s circuit. Int. J Comput Sci Net Security 2008; 8(4)
[2]
Biryukov A, Nakahara J Jr, Preneel B, Vandewalle J. , New Weak- Key Classes of IDEA", Inf and Communications Security, 4th Int Conf, ICICS, Springer- Verlog 2002; 315-26.
[3]
Daemen J, Rijmen V. AES Proposal: Rijndael, AES Algorithm 1999; Submission, September 3.
[4]
Zeghid M, Machhout M, Khriji L, Baganne A. A modified AES based algorithm for image encryption. World Academy of Science, Engg & Tech 2007.
[5]
Grabbe J. Data encryption standard: The triple DES algorithm. Iillustrated Laissez faire city time 2003; 2(28).
[6]
Schneier B. Description of a New Variable-Length key, 64-bit Block Cipher (Blowfish). Cambridge Security Workshop Proc Springer-Verlag 1993; 191-204.
[7]
Su L, Li C. Local Prediction of Chaotic Time Series based on Polynomial Coefficient Autoregressive ModelMathematical Problems in Engg 2015; ID 901807: 14 pages
[8]
Gleick J. Chaos: Making a New Science. Viking: New York 1987.
[9]
Pareek NK, Patidar V, Sud KK. Diffusion-substitution based gray image encryption scheme. Dig Signal Proc 2013; 23(3): 894-901.
[10]
Gao H, Zhang Y, Liang S, Li D. A new chaotic algorithm for image encryption. Chaos Sol & Fractals 2006; 29(2): 393-9.
[11]
Zhang L, Liao X, Wang X. An image encryption approach based on chaotic maps. Chaos Sol and Fractals 2005; 24(3): 759-65.
[12]
Al-qdah M. A Hybrid Security System Based on Bit Rotation and Chaotic Maps. Current Sig Transductton Therapy 2018; 13: 1.
[13]
Khurana M, Singh H. A spiral-phase rear mounted triple masking for securing optical image encryption based on gyrator transform. Recent Patents Comput Sci 2018; 11: 1.
[14]
Gupta R, Pachauri R, Singh AK. An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech an (2018); 15(2): 63-83.
[15]
Geetha K, Chitra S, Madhusudhanan B, Gao XZ. Securing patient data in wireless body area sensor network using biometrics based key generation. Curr Med Imag Rev 2017; 13: 231.
[16]
Liu L, Miao S. A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer plus 2016; 5: 289.
[17]
Zhou Q, Wong K, Liao X, Xiang T, Hu T. Parallel image encryption algorithm based on discretized chaotic map. Chaos Sol & Fractals 2008; 38(4): 1081-92.
[18]
Borujeni SE, Eshghi M. Chaotic image encryption design using Tompkins-paige algorithm Hindawi Publ Corp, Mathematical Prob in Engg 2009; ID- 762652: 22 pages
[19]
Mao Y, Chen G, Lian S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 2004; 14(10): 3613-24.
[20]
Hua Z, Zhou Y, Pun CM, Chen CLP 2D. Sine logistic modulation map for image encryption. Inf Sci 2015; 297: 80-94.
[21]
Zhao J, Wang S, Zhang L, Wang X. Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. J Elect Comp Engg 2017; 2017(ID 8672716): 10 pages.
[22]
Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Mathematical Comput Mod 2010; 52(11-12): 2028-35.
[23]
Ulam SM, Neumann JV. On combination of stochastic and deterministic processes. Bullst Am Math Soc 1947; 53(11): 1120.
[24]
Shannon CE. A mathematical theory of communication. Bell System Tech J 1948; 27: 379-423, 623-56.