[1]
K. S. Ntalianis, S. D. Kollias: Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes. Proceedings of 2005 IEEE International Conference on Image Processing (ICIP 2005), pp.1110-1113.
DOI: 10.1109/icip.2005.1530254
Google Scholar
[2]
W. Z. Yu, H. G. Ma, L. H. Wang: Method for encrypting image with chaos series. Journal of Computer Applications Vol. 25 (2009), pp.141-143.
Google Scholar
[3]
G. R. Chen, Y. B. Mao, C. K. Chui: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals Vol. 21 (2004), pp.749-761.
DOI: 10.1016/j.chaos.2003.12.022
Google Scholar
[4]
K. Zhang, D. H. Wang: Research on Compound Encryption of Digital Image Based on Logistic Chaotic Sequence. Computer and Modernization, (2005), pp.66-69.
Google Scholar
[5]
D. X. Qi, J. C. Zou: A novel scrambling transformation and its application in Image information hiding. Science in China (Series E) Vol. 30 (2000), pp.440-447.
Google Scholar
[6]
K. X. Yi, X. Sun, J. Y. Shi: An Image Encryption Algorithm Based on Chaotic Sequences. Journal of Computer-Aided Design & Computer Graphics Vol. 12 (2000), pp.672-676.
Google Scholar
[7]
Pecora L. M., Carroll T. L.: Synchronization in Chaotic Systems. Phys. Rev. Lett. Vol. 64 (1990), pp.821-824.
DOI: 10.1103/physrevlett.64.821
Google Scholar
[8]
L. Shan, H. Qiang, J. Li: Chaotic optimization algorithm based on Tent map. Control and Decision Vol. 20 (2005), pp.179-182.
Google Scholar
[9]
Xiang T, Wong K, Liao X: An improved chaotic cryptosystem with external key. Communications in Nonlinear Science and Numerical Simulation Vol. 13 (2008), pp.1879-1887.
DOI: 10.1016/j.cnsns.2007.04.017
Google Scholar