| [1] | Zhang, Y. (2011) Image Encryption with Logistic Map and Cheat Image. International Conference on Computer Research and Development, 1, 97-101. https://doi.org/10.1109/ICCRD.2011.5763981
 | 
                     
                                
                                    
                                        | [2] | Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 8, 29-42. https://doi.org/10.1080/0161-118991863745
 | 
                     
                                
                                    
                                        | [3] | Fridrich, J. (1997) Image Encryption Based on Chaotic Maps. International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation, 2, 1105-1110. https://doi.org/10.1109/ICSMC.1997.638097
 | 
                     
                                
                                    
                                        | [4] | Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. https://doi.org/10.1142/S021812749800098X
 | 
                     
                                
                                    
                                        | [5] | Pak, C. and Huang, L. (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Processing, 138, 129-137. https://doi.org/10.1016/j.sigpro.2017.03.011
 | 
                     
                                
                                    
                                        | [6] | Wang, H., Xiao, D., Chen, X. and Huang, H. (2017) Cryptanalysis and Enhancements of Image Encryption Using Combination of the 1D Chaotic Map. Signal Processing, 11, 165-168. | 
                     
                                
                                    
                                        | [7] | Xu, L., Gou, X., Li, Z. and Li, J. (2017) A Novel Chaotic Image Encryption Algorithm Using Block Scrambling and Dynamic Index Based Diffusion. Optics & Lasers in Engineering, 91, 41-52. https://doi.org/10.1016/j.optlaseng.2016.10.012
 | 
                     
                                
                                    
                                        | [8] | Ma, X., Fu, C., Lei, W. and Li, S. (2011) A Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process. International Journal of Advancements in Computing Technology, 3, 223-233. | 
                     
                                
                                    
                                        | [9] | 孙燮华. 图像加密算法与实践[M]. 北京: 科学出版社, 2013. | 
                     
                                
                                    
                                        | [10] | 柴秀丽, 甘志华, 袁科, 路杨, 陈怡然. An Image Encryption Scheme Based on Three-Dimensional Brownian Motion and Chaotic System [J]. 中国物理b, 英文版, 2017, 26(2): 99-113. | 
                     
                                
                                    
                                        | [11] | Wu, J., Liao, X. and Yang, B. (2017) Cryptanalysis and Enhancements of Image Encryption Based on Three-dimensional Bit Matrix Permutation. Signal Processing, 142, 292-300. https://doi.org/10.1016/j.sigpro.2017.06.014
 | 
                     
                                
                                    
                                        | [12] | Robinson, R.C. 动力系统导论[M]. 北京: 机械工业出版社, 2005. | 
                     
                                
                                    
                                        | [13] | The USC-SIPI Image Database. http://sipi.usc.edu/database/ | 
                     
                                
                                    
                                        | [14] | 张勇. 混沌数字图像加密[M]. 北京: 清华大学出版社, 2016. | 
                     
                                
                                    
                                        | [15] | Zhang, Y., Xia, J., Cai, P. and Chen, B. (2012) Plaintext Related Two-Level Secret Key Image Encryption Scheme. Teklanika Indonesian Journal of Electrical Engineering, 10, 1254-1262. https://doi.org/10.11591/telkomnika.v10i6.1599
 |