References
- Ali, T., & Ali, R. 07 (2020). A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 79(27–28), 19853–19873. https://doi.org/10.1007/s11042-020-08850-5
- Arpaci, B., Kurt, E., & Çelik, K. (2020). A new algorithm for the colored image encryption via the modified Chua’s circuit. Engineering Science and Technology, an International Journal, 23(3), 595–604. https://doi.org/10.1016/j.jestch.2019.09.001
- Beloucif, A., & Noui, L. (2018). A lossless image encryption algorithm using matrix transformations and XOR operation. International Journal of Information and Communication Technology, 13(1), 99–113. https://doi.org/10.1504/IJICT.2018.090424
- Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009
- Chen, J., Qin, J., Xiang, X., & Tan, Y. (2020). A new encrypted image retrieval method based on feature fusion in cloud computing. International Journal of Computational Science and Engineering, 22(1), 114–123. https://doi.org/10.1504/IJCSE.2020.107261
- Chen, Y., Lin, J., Chang, C.-C., & Hu, Y.-C. (2020). Reversibly hiding data using dual images scheme based on EMD data hiding method. International Journal of Computational Science and Engineering, 21(4), 583–592. https://doi.org/10.1504/IJCSE.2020.106872
- Elkamchouchi, H., Salama, W. M., & Abouelseoud, Y. (2019). ArMTFr: A new permutation-based image encryption scheme. International Journal of Electronic Security and Digital Forensics, 11(1), 1–28. https://doi.org/10.1504/IJESDF.2019.096516
- Fan, W., Li, L., Chen, X., Jiang, H., Li, Z., & Li, K.-C. (2018). Deploying parallelised ciphertext-policy attributed-based encryption in clouds. International Journal of Computational Science and Engineering, 16(3), 321–333. https://doi.org/10.1504/IJCSE.2018.091784
- Gaur, G., Sharma, J. B., & Tharani, L. (2021). Verilog implementation of biometric-based transmission of fused images using data encryption standards algorithm. In Nanoelectronics, circuits and communication systems (pp. 455–467). Springer.
- Hu, F., Pu, C., Gao, H., Tang, M., & Li, L. (2016). An image compression and encryption scheme based on deep learning. CoRR, abs/1608.05001.
- Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017, 1–12. https://doi.org/10.1155/2017/3675459
- Kamil, S., Ayob, M., Sheikh Abdullah, S. N. H., & Ahmad, Z. (2018). Optimized data hiding in complemented or non-complemented form in video steganography. In 2018 Cyber Resilience Conference (CRC) (pp. 1–4). IEEE. https://doi.org/10.1109/CR.2018.8626871
- Karim Abdmouleh, M., Khalfallah, A., & Bouhlel, M. S. (2017). A novel selective encryption dwt-based algorithm for medical images. In 2017 14th International Conference on Computer Graphics, Imaging and Visualization (pp. 79–84). IEEE.
- Kaur, G., Agarwal, R., & Patidar, V. (2020). Chaos based multiple order optical transform for 2D image encryption. Engineering Science and Technology, an International Journal, 23(5), 998–1014. https://doi.org/10.1016/j.jestch.2020.02.007
- Lin, S. (2012). Image transmission and cryptography on the basis of mobius transform. In 2012 5th International Congress on Image and Signal Processing (pp. 258–261). IEEE.
- Luo, E., Liu, Q., & Wang, G. (2016). Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Communications Letters, 20(9), 1772–1775. https://doi.org/10.1109/LCOMM.2016.2584614
- Maniyath, S. R., & Thanikaiselvan, V. (2020). An efficient image encryption using deep neural network and chaotic map. Microprocessors and Microsystems, 77, 103134. https://doi.org/10.1016/j.micpro.2020.103134
- Pan, H., Lei, Y., & Jian, C. (2018). Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), 1–10. https://doi.org/10.1186/s13640-018-0386-3
- Qiu, G.-H., Lee, C.-F., & Chang, C.-C. (2020). Greedy algorithm for image quality optimisation based on turtle-shell steganography. International Journal of Computational Science and Engineering, 23(1), 50–62. https://doi.org/10.1504/IJCSE.2020.110192
- Qiuqiong, C., Yao, D., & Zhiyong, N. (2020). An image encryption algorithm based on combination of chaos and DNA encoding. In 2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL) (pp. 182–185). IEEE. https://doi.org/10.1109/CVIDL51233.2020.00043
- Roy, M., Chakraborty, S., & Mali, K. 06 (2021). The MSK: a simple and robust image encryption method. Multimedia Tools and Applications, 80(14), 21261–21291. https://doi.org/10.1007/s11042-021-10761-y
- Sasikaladevi, N., Mahalakshmi, N., & Archana, N. (2018). Leach-genus 2 hyper elliptic curve based secured light-weight visual cryptography for highly sensitive images. In International Conference on Advances in Computing and Data Sciences (pp. 302–311). Springer.
- Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- Singh Yadav, S., & Singh, Y. (2018). Image encryption based on random scrambling and chaotic logistic map. International Journal of Grid and Utility Computing, 9(3), 228–234. https://doi.org/10.1504/IJGUC.2018.093979
- Tabeidi, R. A., Morse, H. F., Masaad, S. M., Al-shammari, R. H., & Alsaffar, D. M. (2020). Create a hybrid algorithm by combining hill and advanced encryption standard algorithms to enhance efficiency of RGB image encryption. In International Conference on Soft Computing and Pattern Recognition (pp. 749–757). Springer.
- Tripathy, A. K., Das, T. K., & Navaneethan, C. (2019). Data cryptography based on musical notes on a fingerboard along with a dice. Indonesian Journal of Electrical Engineering and Computer Science, 14(3), 1286–1290. https://doi.org/10.11591/ijeecs.v14.i3.pp1286-1290
- Upadhyay, S., Dave, D., & Sharma, G. (2016). Image encryption by using block-based symmetric transformation algorithm (international data encryption algorithm). In Proceedings of International Conference on ICT for Sustainable Development (pp. 531–539). Springer.
- Wadi, S. M., & Zainal, N. (2014). High definition image encryption algorithm based on AES modification. Wireless Personal Communications, 79(2), 811–829. https://doi.org/10.1007/s11277-014-1888-7
- Wei, F., Ma, J., Ma, C., & Li, X. (2015). A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. International Journal of Embedded Systems, 7(3/4), 257–265. https://doi.org/10.1504/IJES.2015.072366
- Wen, W., Zhang, Y., Fang, Y., & Fang, Z. (2016). A novel selective image encryption method based on saliency detection. In 2016 Visual Communications and Image Processing (VCIP) (pp. 1–4). IEEE. https://doi.org/10.1109/VCIP.2016.7805456
- Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31–38.
- Xu, M., & Tian, Z. (2019). A novel image cipher based on 3D bit matrix and Latin cubes. Information Sciences, 478, 1–14. https://doi.org/10.1016/j.ins.2018.11.010
- Yan, X., Wang, X., & Xian, Y. 03 (2021). Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimedia Tools and Applications, 80(7), 10949–10983. https://doi.org/10.1007/s11042-020-10218-8
- Yang, H., Ning, Y., & Wang, Y. (2019). Research on RSA and hill hybrid encryption algorithm. International Journal of Computational Science and Engineering, 20(1), 1–6. https://doi.org/10.1504/IJCSE.2019.103241
- Zhang, Y., Li, X., & Hou, W. (2017). A fast image encryption scheme based on AES. In 2017 2nd International Conference on Image, Vision and Computing (ICIVC) (pp. 624–628). IEEE. https://doi.org/10.1109/ICIVC.2017.7984631
- Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., & Li, X.-F. (2020). Image encryption scheme based on a novel fractional order compound chaotic attractor. International Journal of Information and Computer Security, 13(2), 166–186. https://doi.org/10.1504/IJICS.2020.108847
- Zhao, N., Zhou, Z., & Liao, L. (2019). Partial-duplicate image retrieval based on HSV colour space for coverless information hiding. International Journal of Computational Science and Engineering, 19(1), 15–24. https://doi.org/10.1504/IJCSE.2019.099675