References
- Akkasaligar, P. T., & Biradar, S. (2020). Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 29(2), 91–101.
- Anh, L. D., Vo, B., & Pedrycz, W. (2017). Information granulation construction and representation strategies for classification in imbalanced data based on granular computing. Journal of Information and Telecommunication, 1(2), 113–126. https://doi.org/10.1080/24751839.2017.1323476
- Bao, L., & Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images. Information Sciences, 324, 197–207. https://doi.org/10.1016/j.ins.2015.06.049
- Chakraborty, S., Seal, A., Roy, M., & Mali, K. (2016). A novel lossless image encryption method using DNA substitution and chaotic logistic map. International Journal of Security and Its Applications, 10(2), 205–216. https://doi.org/10.14257/ijsia
- Cheng, Q., Hua, Y., & Stoica, P. (2000). Asymptotic performance of optimal gain-and-phase estimators of sensor arrays. IEEE Transactions on Signal Processing, 48(12), 3587–3590. https://doi.org/10.1109/78.887058
- Dar, S. B. (2014). Enhancing the security of Caesar Cipher using double substitution method. International Journal of Computer Science & Engineering Technology, 5(7), 772–774.
- Deshpande, K., Girkar, J., & Mangrulkar, R. (2023). Security enhancement and analysis of images using a novel Sudoku-based Encryption Algorithm. Journal of Information and Telecommunication, 7(3), 270–303. https://doi.org/10.1080/24751839.2023.2183802
- Godara, S., Kundu, S., & Kaler, R. (2018). An improved algorithmic implementation of rail fence Cipher. International Journal of Future Generation Communication and Networking, 11(2), 23–32. https://doi.org/10.14257/ijfgcn
- Goyal, K., & Kinger, S. (2013). Modified Caesar Cipher for better security enhancement. International Journal of Computer Applications, 73(3), 0975–8887. https://doi.org/10.5120/12722-9558
- Hu, F., Pu, C., Gao, H., Tang, M., & Li, L. (2016). An image compression and encryption scheme based on deep learning. CoRR, abs/1608.05001.
- Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017, 1–12.
- Hua, Z., Zhou, Y., & Huang, H. (2019). Cosine-transform-based chaotic system for image encryption. Information Sciences, 480, 403–419. https://doi.org/10.1016/j.ins.2018.12.048
- Lasry, G., Kopal, N., & Wacker, A. (2016). Cryptanalysis of columnar transposition Cipher with long keys. Cryptologia, 40(4), 374–398. https://doi.org/10.1080/01611194.2015.1087074
- Leong, M.-P., Cheung, O. Y., Tsoi, K. H., & Leong, P. H. W. (2000). A bit-serial implementation of the international data encryption algorithm idea. In Proceedings 2000 IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No. PR00871) (pp. 122–131). IEEE.
- Liu, X., Mei, W., & Du, H. (2014). Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. Journal of Modern Optics, 61(19), 1570–1577. https://doi.org/10.1080/09500340.2014.946565
- Maity, A., Ghosh, R., & Bhadra, S. (2022). Image encryption using RSA and advanced Caesar Cipher method. In 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (pp. 1–5).
- Mandal, M. K., Banik, G. D., Chattopadhyay, D., & Nandi, D. (2012). An image encryption process based on chaotic logistic map. IETE Technical Review, 29(5), 395–404. https://doi.org/10.4103/0256-4602.103173
- Maniyath, S. R., & Thanikaiselvan, V. (2020). An efficient image encryption using deep neural network and chaotic map. Microprocessors and Microsystems, 77, Article 103134. https://doi.org/10.1016/j.micpro.2020.103134
- Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265–13280.
- Naim, M., & Ali Pacha, A. (2021). New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. Information Security Journal: A Global Perspective, 32(3), 187–211.
- Osman, T., Psyche, S. S., Deb, T., Firoze, A., & Rahman, R. M. (2019). An algorithmic approach to estimate cognitive aesthetics of images relative to ground truth of human psychology through a large user study. Journal of Information and Telecommunication, 3(2), 156–179. https://doi.org/10.1080/24751839.2018.1542574
- Qowi, Z., & Hudallah, N. (2021). Combining Caesar Cipher and Hill Cipher in the generating encryption key on the Vigenere Cipher Algorithm. In Journal of Physics: Conference Series (Vol. 1918, pp. 042009). IOP Publishing.
- Rachmawati, D., Hardi, S. M., & Pasaribu, R. P. (2019). Combination of columnar transposition Cipher Caesar Cipher and lempel ziv welch algorithm in image security and compression. Journal of Physics: Conference Series, 1339(1), Article 012007.
- Raja, S., & Suruliandi, A. (2018). Secured image compression using AES in Bandelet domain. International Journal of Computational Science and Engineering, 17(2), 208–219. https://doi.org/10.1504/IJCSE.2018.094930
- Ritter, T. (1991). Transposition Cipher with pseudo-random shuffling: The dynamic transposition combiner. Cryptologia, 15(1), 1–17. https://doi.org/10.1080/0161-119191865731
- Saini, B. (2015). Modified Caesar Cipher and rail fence technique to enhance security. Int J Trend Res Dev, 2(5), 348–350.
- Sanchez-Avila, C., & Sanchez-Reillol, R. (2001). The Rijndael block Cipher (AES proposal): A comparison with des. In Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186) (pp. 229–234). IEEE.
- Seal, A., Chakraborty, S., & Mali, K. (2017). A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single-level haar wavelet transform. In Proceedings of the First International Conference on Intelligent Computing and Communication (pp. 603–611). Springer.
- Shrivastava, G., Sharma, R., & Chouhan, M. (2013). Using letters frequency analysis in Caesar Cipher with double columnar transposition technique. International Journal of Engineering Sciences & Research Technology, 2(6): June, 2013.
- Siahaan, A. P. U. (2017). Rail-fence-cryptography-in-securing-information.
- Srikantaswamy, S., & Phaneendra, D. H. (2012). Improved Caesar Cipher with random number generation technique and multistage encryption. International Journal on Cryptography and Information Security (IJCIS), 2(4), 39–49. https://doi.org/10.5121/ijcis
- Srivastava, M., Srivastava, U., & Srivastava, S. (2023). Modified Caesar Cipher with image steganography. In 2023 6th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1–6).
- Standard, D. E. (1977). Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce, FIPS Publication 46-3, 23, 1–18.
- Talbert, R. (2006). The cycle structure and order of the rail fence Cipher. Cryptologia, 30(2), 159–172. https://doi.org/10.1080/01611190500380082
- Wadi, S., & Zainal, N. (2014). High definition image encryption algorithm based on AES modification. Wireless Personal Communications, 79(2), 811–829. https://doi.org/10.1007/s11277-014-1888-7
- Wang, X., Wang, S., Zhang, Y., & Guo, K. (2017). A novel image encryption algorithm based on chaotic shuffling method. Information Security Journal: A Global Perspective, 26(1), 7–16.
- Yang, H., Ning, Y., & Wang, Y. (2019). Research on RSA and Hill hybrid encryption algorithm. International Journal of Computational Science and Engineering, 20(1), 1–6. https://doi.org/10.1504/IJCSE.2019.103241
- Ye, R. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298. https://doi.org/10.1016/j.optcom.2011.07.070
- Zhang, Y. (2016). The image encryption algorithm with plaintext-related shuffling. IETE Technical Review, 33(3), 310–322. https://doi.org/10.1080/02564602.2015.1087350