|
[1]
|
Stinson, D.R. (1995) Cryptography: Theory and Practice. CRC Press, Boca Raton.
|
|
[2]
|
Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. [Google Scholar] [CrossRef]
|
|
[3]
|
Ye, R. (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Optics Communications, 284, 5290-5298. [Google Scholar] [CrossRef]
|
|
[4]
|
Tang, Z., Song, J., Zhang, X. and Sun, R. (2016) Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps. Optics and Lasers in Engineering, 80, 1-11. [Google Scholar] [CrossRef]
|
|
[5]
|
Ye, R. (2014) A Novel Image Encryption Scheme Based on Generalized Multi-Sawtooth Maps. Fundamenta Informaticae, 133, 87-104. [Google Scholar] [CrossRef]
|
|
[6]
|
Ding, C., Pei, D. and Salomaa, A. (1996) Chinese Remainder Theorem (Applications in Computing, Coding, Cryptography). World Scientific, Singapore. [Google Scholar] [CrossRef]
|
|
[7]
|
Zhu, H., Zhao, C. and Zhang, X. (2013) A Novel Image Encryption-Compression Scheme Usinghyper-Chaos and Chinese Remainder Theorem. Signal Process. Image Communication, 28, 670-680.
[Google Scholar] [CrossRef]
|
|
[8]
|
Brindhaa, M. and Ammasai Goundenb, N. (2016) A Chaos-Based Image Encryption and Lossless Compression Algorithm Using Hash Table and Chinese Remainder Theorem. Applied Soft Computing, 40, 379-390.
[Google Scholar] [CrossRef]
|
|
[9]
|
Ye, R. and Zhou, W. (2011) An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice. International Journal of Information & Communication Technology Research, 1, 344-348.
|
|
[10]
|
Alvarez, G. and Li, S.J. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation & Chaos, 16, 2129-2151. [Google Scholar] [CrossRef]
|
|
[11]
|
Wu, Y., Noonan, J.P. and Agaian, S. (2011) NPCR and UACI Randomness Tests for Image Encryption. Journal of Selected Areas in Telecommunications (JSAT), 1, 31-38.
|
|
[12]
|
Shannon, C.E. (1949) Communication Theory of Secrecy Systems. Bell System Technical Journal, 28, 656-715.
[Google Scholar] [CrossRef]
|
|
[13]
|
Petrou, Maria. Image Processing: The Fundamentals. Second Edition. Wiley, Hoboken, New Jersey, USA, 2010.
[CrossRef]
|
|
[14]
|
Wen, W., Zhang, Y., Su, M., et al. (2017) Differential Attack on a Hyper-Chaos-Based Image Cryptosystem with a Classic Bi-Modular Architecture. Nonlinear Dynamics, 87, 383-390. [Google Scholar] [CrossRef]
|