References
- Shakiba, A. (2019). Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks. Journal of Information and Optimization Sciences, 40(3), 725-750.
- Wang, X., & Xu, D. (2014). A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dynamics,79(4), 2449-2456.
- Wolfram, S. (1986). Cryptography with Cellular Automata. Lecture Notes in Computer Science Advances in Cryptology — CRYPTO Proceedings, 429-432.
- Wolfram, S. (1986). Random sequence generation by cellular automata. Advances in Applied Mathematics, 7(2), 123-169.
- Achkoun, K., Hanin, C., & Omary, F. (2020). SPF-CA: A new cellular automata based block cipher using key-dependent S-boxes. Journal of Discrete Mathematical Sciences and Cryptography, 23(8), 1529-1544.
- Bakhshandeh, A., & Eslami, Z. (2013). An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering, 51(6), 665-673.
- Wang, X., & Luan, D. (2013). A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), 3075-3085.
- Ray, A., & Das, D. (2010). Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata. Communications in Computer and Information Science Information Processing and Management, 269-275.
- Anghelescu, P., Ionita, S., & Sofron, E. (2008). FPGA Implementation of Hybrid Additive Programmable Cellular Automata Encryption Algorithm. Eighth International Conference on Hybrid Intelligent Systems.
- Hanis, S., & Amutha, R. (2015).A Novel Image Encryption Scheme Using Chaos and Hybrid Cellular Automata. International Journal of Innovation and Scientific Research , 25(1), 299-307.
- Srichavengsup, W., & San-Um, W. (2016).Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security. International Journal of Network Security, 18, 1130-1142.
- Niyat, A. Y., Moattar, M. H., & Torshiz, M. N. (2017). Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering, 90, 225-237.
- Sen, S., Shaw, C., Chowdhuri, D. R., Ganguly, N., & Chaudhuri, P. P. (2002). Cellular Automata Based Cryptosystem (CAC). Information and Communications Security Lecture Notes in Computer Science, 303-314.
- Abdo, A., Lian, S., Ismail, I., Amin, M., & Diab, H. (2013). A cryptosystem based on elementary cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(1), 136-147.
- Jose, J., & Chowdhury, D. R. (2017). Investigating four neighbourhood cellular automata as better cryptographic primitives. Journal of Discrete Mathematical Sciences and Cryptography, 20(8), 1675-1695.
- Das, S., & Roychowdhury, D. (2011). On usage of cellular automata in strengthening stream ciphers. Journal of Discrete Mathematical Sciences and Cryptography, 14(4), 369-390.
- Mehta, R. K., & Rani, R. (2016). Pattern generation and symmetric key block ciphering using cellular automata. International Conference on Advances in Computing, Communications and Informatics (ICACCI).
- White, R., & Engelen, G. (1993). Cellular automata and fractal urban form: a cellular modeling approach to the evolution of urban land-use patterns. Environment and Planning A, 25, 1175-1199.
- Wolfram, S. (2002). A new kind of science. Champaign, IL: Wolfram Media.
- May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459-467.
- Survey of 3D Chaotic Map Techniques for Image Encryption. (2015). International Journal of Science and Research (IJSR), 4(12), 1000-1004.
- Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. The 9th International Conference for Young Computer Scientists.
- Hossain, M., Rahman, M., Rahman, A. B., & Islam, S. (2014). A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. International Conference on Informatics, Electronics & Vision
- Toffoli, T., & Margolus, N. H. (1990). Invertible cellular automata: A review. Physica D: Nonlinear Phenomena, 45(1-3), 229-253.
- Philip, M.(2011). An Enhanced Chaotic Image Encryption. International Journal of Computer Science, Engineering and Information Technology, 1(5), 77-83.
- Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication. Urbana: University of Illinois Press.
- Ramasamy, P., Ranganathan, V., Kadry, S., Damaševičius, R., & Blažauskas, T. (2019). An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map. Entropy,21(7), 656.
- Yogeshwaran, S., Vignesvar, K. S., PrabhuSoundharian, E. M., & Ms Hanis, S. (2015) A Novel Image Encryption Scheme Using Chaotic Logistic Mapping& Hybrid Cellular Automata, International Journal of Electrical, Electronics and Data Communication (IJEEDC), 3(6), 81-86.
- Ping, P., Xu, F., & Wang, Z. (2014). Image encryption based on non-affine and balanced cellular automata. Signal Processing,105, 419-429.
- Chen, R., & Lai, J. (2007). Image security system using recursive cellular automata substitution. Pattern Recognition,40(5), 1621-1631.
- Wang, X., & Jin, C. (2012). Image encryption using Game of Life permutation and PWLCM chaotic system. Optics Communications,285(4), 412-417.
- Ye, G., Pan, C., Huang, X., & Mei, Q. (2018). An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics, 94(1), 745– 756.
- Ping, P., Wu, J., Mao, Y., Xu, F., & Fan, J. (2018). Design of image cipher using life-like cellular automata and chaotic map. Signal Processing,150, 233-247.