|
[1]
|
Li, X., Mou, J., Cao, Y. and Banerjee, S. (2022) An Optical Image Encryption Algorithm Based on a Fractional Order Laser Hyperchaotic System. International Journal of Bifurcation and Chaos, 32, Article ID: 2250035.
[Google Scholar] [CrossRef]
|
|
[2]
|
Faragallah, O.S., et al. (2021) Efficient Optical Double Image Cryptosystem Using Chaotic Mapping-Based Fresnel Transform. Optical and Quantum Electronics, 53, 305. [Google Scholar] [CrossRef]
|
|
[3]
|
Tang, Z., Yin, Z., Wang, R., Wang, X., Yang, J. and Cui, J. (2022) A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement. Journal of Chemistry, 2022, Article ID: 3906392.
[Google Scholar] [CrossRef]
|
|
[4]
|
Huang, Z.-W. and Zhou, N.-R. (2022) Image Encryption Scheme Based on Discrete Cosine Stockwell Transform and DNA-Level Modulus Diffusion. Optics & Laser Technology, 149, Article ID: 107879.
[Google Scholar] [CrossRef]
|
|
[5]
|
Chen, L., Li, C. and Li, C. (2022) Security Measurement of a Medical Communication Scheme Based on Chaos and DNA Coding. Journal of Visual Communication and Image Representation, 83, Article ID: 103424.
[Google Scholar] [CrossRef]
|
|
[6]
|
Elsaid, S.A., Alotaibi, E.R. and Alsaleh, S. (2023) A Robust Hybrid Cryptosystem Based on DNA and Hyperchaoticfor Images Encryption. Multimedia Tools and Applications, 82, 1995-2019.
|
|
[7]
|
Gupta, M., Singh, V.P., Gupta, K.K. and Shukla, P.K. (2023) An Efficient Image Encryption Technique Based on Two-Level Security for Internet of Things. Multimedia Tools and Applications, 82, 5091-5111.
[Google Scholar] [CrossRef]
|
|
[8]
|
Wen, H., et al. (2022) Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and2D-LASM. Entropy, 24, 1332. [Google Scholar] [CrossRef] [PubMed]
|
|
[9]
|
Dong, Y., Huang, X. and Ye, G. (2021) Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. Security and Communication Networks, 2021, Article ID: 6677325.
[Google Scholar] [CrossRef]
|
|
[10]
|
Tütüncü, K. and Çataltaş, Ö. (2021) Compensation of Degradation, Security, and Capacity of LSB Substitution Methods by a New Proposed Hybrid n-LSB Approach. Computer Science and Information Systems, 18, 1311-1332.
|
|
[11]
|
Vidhya, R. and Brindha, M. (2021) Evaluation and Performance Analysis of Chinese Remainder Theorem and Its Application to Lossless Image Compression. Journal of Ambient Intelligence and Humanized Computing.
[Google Scholar] [CrossRef]
|
|
[12]
|
Ye, X., Mou, J., Wang, Z., Li, P. and Luo, C. (2018) Dynamic Characteristic Analysis for Complexity of Continuous Chaotic Systems Based on the Algorithms of SE Complexity and C Complexity. In: Gu, X.M., Liu, G.L. and Li, B., Eds., Machine Learning and Intelligent Communications, Springer, Berlin, 647-657.
[Google Scholar] [CrossRef]
|
|
[13]
|
Yang, Y.-G., Guan, B.-W., Li, J., Li, D., Zhou, Y.-H. and Shi, W.-M. (2019) Image Compression-Encryption Scheme Based on Fractional Order Hyper-Chaotic Systems Combined with 2D Compressed Sensing and DNA Encoding. Optics & Laser Technology, 119, Article ID: 105661. [Google Scholar] [CrossRef]
|
|
[14]
|
Zhang, Y., Li, C., Li, Q., Zhang, D. and Shu, S. (2012) Breaking a Chaotic Image Encryption Algorithm Based on Perceptron Model. Nonlinear Dynamics, 69, 1091-1096. [Google Scholar] [CrossRef]
|
|
[15]
|
Wu, Y., Noonan, J.P. and Agaian, S. (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1, 31-38.
|
|
[16]
|
Ullah, A., Jamal, S.S. and Shah, T. (2018) A Novel Scheme for Image Encryption Using Substitution Box and Chaotic System. Nonlinear Dynamics, 91, 359-370. [Google Scholar] [CrossRef]
|