References
- B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, “A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia Tools Appl., Vol. 71, no. 3, pp. 1469–97, Aug. 2014.
- H. Hermassi et al., “Improvement of an image encryption algorithm based on hyper-chaos,” Telecommun. Syst., Vol. 52, pp. 539–49, Feb. 2013.
- G. Ye, and K.-W. Wong, “An efficient chaotic image encryption algorithm based on a generalized Arnold map,” Nonlinear Dyn., Vol. 69, pp. 2079–87, Apr. 2012.
- X. Wang and Q. Zhang, “DNA computing-based cryptography,” in 4th International Conference on Bio-Inspired Computing, BIC-TA '09, Beijing, China, 2009, pp. 10–3.
- H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, “Data hiding methods based upon DNA sequences,” Inf. Sci., Vol. 180, no. 11, pp. 2196–208, Jun. 2010.
- M. Babaei, “An efficient combination of chaotic logistic map and DNA computing for data encryption,” in 9th International ISC Conference on Information Security and Cryptology, Tabriz University, Iran, 2012.
- Q. Wang, Q. Zhang, and C. Zhou, “A multilevel image encryption algorithm based on chaos and DNA coding,” in 4th International Conference on Bio-Inspired Computing, BIC-TA '09, Beijing, China, 2009, pp 1–5.
- X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,” J. Syst. Softw., Vol. 85, no. 2, pp. 290–9, Feb. 2012.
- L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Comput. Electr. Eng., Vol. 38, no. 5, pp. 1240–8, Sept. 2012.
- Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition combining with chaotic maps,” Math. Comput. Model., Vol. 52, no. 11–12, pp. 2028–35, Dec. 2010.
- S. Zhou, Q. Zhang, and X. Wei, “Image encryption algorithm based on DNA sequences for the big image,” in International Conference on Multimedia Information Networking and Security (MINES), Nanjing University, China, 2010, pp. 884–8.
- H. Liu, X. Wang, and A. Kadir, “Image encryption using DNA complementary rule and chaotic maps,” Appl. Soft Comput., Vol. 12, no. 5, pp. 1457–66, May 2012.
- Y. Wu, Y. Zhou, J. P. Noonan, and S. Agaian, “Design of image cipher using Latin squares,” Inf. Sci., Vol. 264, pp. 317–39, Apr. 2014.
- M. Amos, G. Pǎun, G. Rozenberg, and A. Salomaa, “Topics in the theory of DNA computing,” Theor. Comput. Sci., Vol. 287, no. 1, pp. 3–38, Sept. 2002.
- M. Borda, and O. Tornea, “DNA secret writing techniques,” in 8th International Conference on Communications (COMM), Romania, 2010, pp. 451–6.
- Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik Int. J. Light Electron Optics, Vol. 124, no. 18, pp. 3596–600, Sept. 2013.