[1]
Agarwal, S. Secure image transmission using fractal and 2D-chaotic maps,. Journal of Imaging, 4(1), 17. (2018).
Google Scholar
[2]
Ahmad, J., Masood, F., Shah, S. A., Jamal, S. S., & Hussain, I. A novel secure occupancy monitoring scheme based on the multi-chaos mapping,. Symmetry, 12(3), 350. (2020).
DOI: 10.3390/sym12030350
Google Scholar
[3]
Ali, T. S., & Ali, R. A novel medical image encryption scheme using TLTS and Henon chaotic map,. IEEE Access, 8, 71974–71992. (2020).
DOI: 10.1109/access.2020.2987615
Google Scholar
[4]
Chen, G., & Ueta, T. Yet another chaotic attractor. International Journal of Bifurcation and Chaos,, 9(07), 1465–1466. (1999).
DOI: 10.1142/s0218127499001024
Google Scholar
[5]
Henan M. A two-dimensional mapping with a strange attractor,. In The theory of chaotic attractors (p.94–102). Springer. (1976).
DOI: 10.1007/978-0-387-21830-4_8
Google Scholar
[6]
Khan, M., Masood, F., Alghafis, A., Amin, M., & Batool Naqvi, S. I.. A novel image encryption technique using a hybrid method of discrete dynamical chaotic maps and Brownian motion., PLoS ONE, 14(12), e0225031. (2019).
DOI: 10.1371/journal.pone.0225031
Google Scholar
[7]
Li, C., & Chen, G. Chaos in the fractional-order Chen system and its control., Chaos, Solitons & Fractals, 22(3), 549–554. (2004).
DOI: 10.1016/j.chaos.2004.02.035
Google Scholar
[8]
Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. A novel hybrid secure image encryption based on Julia's set of fractals and 3D Lorenz chaotic map,. Entropy, 22(3), 274. (2020a).
DOI: 10.3390/e22030274
Google Scholar
[9]
Masood, F., Bonilla, W., Ahmad, J., Sankar, S., Rubaiee, S., Buchanan, W. J., et al. A novel privacy approach of digital aerial images based on the Mersenne twister method with DNA genetic encoding and chaos., Remote Sensing, 12(11), 1893. (2020b).
DOI: 10.3390/rs12111893
Google Scholar
[10]
Özkaynak, F. Chaos-based substitution boxes as a cryptographic primitive: Challenges and opportunities., Chaotic Modeling and Simulation, 1, 49–57. (2019).
Google Scholar
[11]
Özkaynak, F. On the effect of a chaotic system in performance characteristics of chaos-based s-box designs., Physica A: Statistical Mechanics and its Applications, 550, 124072. (2020).
DOI: 10.1016/j.physa.2019.124072
Google Scholar
[12]
Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Masood, F., Khan, F., & Buchanan, W. J. et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution., IEEE Access. (2020).
DOI: 10.1109/access.2020.3012912
Google Scholar
[13]
Sasikaladevi, N., Geetha, K., Sriharshini, K., & Aruna, M.D. H3-hybrid multilayered hyperchaotic hyperelliptic curve-based image encryption system., Optics & Laser Technology, 127, 106173. (2020).
DOI: 10.1016/j.optlastec.2020.106173
Google Scholar
[14]
Tsafack, N., Kengne, J., Abd-El-Atty, B., Iliyasu, A. M., Hirota, K., & Abd EL-Latif. A. A. Design and implement a simple dynamical 4-D chaotic circuit with applications in image encryption., Information Sciences, 515, 191–217. (2020).
DOI: 10.1016/j.ins.2019.10.070
Google Scholar
[15]
Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., Andreev, V.S., & Butusov, D.N. Adaptive chaotic maps and their application to pseudo-random numbers generation., Chaos, Solitons & Fractals, 133, 109615. (2020).
DOI: 10.1016/j.chaos.2020.109615
Google Scholar
[16]
Wang, S., Wang, C., & Xu, C. An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm., Optics and Lasers in Engineering, 128, 105995. (2020a).
DOI: 10.1016/j.optlaseng.2019.105995
Google Scholar
[17]
Wang, X., Wang, Y., Zhu, X., & Luo, C. A novel chaotic algorithm for image encryption utilizing a one-time pad based on pixel-level and DNA level., Optics and Lasers in Engineering, 125, 105851. (2020b).
DOI: 10.1016/j.optlaseng.2019.105851
Google Scholar
[18]
Zhou, M., & Wang, C. A novel image encryption scheme based on a conservative hyperchaotic system and closed-loop diffusion between blocks., Signal Processing, 171, 107484. (2020).
DOI: 10.1016/j.sigpro.2020.107484
Google Scholar
[19]
Karthik Nandakumar & Anil K. Jain & Sharath Pankanti. Fingerprint-based Fuzzy Vault: Implementation and Performance,. (2007).
Google Scholar
[20]
Xuehu Yan, Ching-nung Yang, Xinpeng Zhang, Shudong Wang. A Common Method of Share Authentication in Image Secret Sharing,. (2020).
Google Scholar
[21]
Huiyong Wang, Mingjun Luo, and Yong Ding Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing,. (2021).
Google Scholar
[22]
Rupali S. Patil, Sonali Patil, Sudeep D. Spade Secret Sharing based Secure Authentication System International Journal of Computer Applications,. (0975 – 8887) Volume 118 – No.22, (May 2015).
DOI: 10.5120/20875-3613
Google Scholar
[23]
Jiayu Wang, Xuehu Yan, Jia Chen, and Yongqiang Yu An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image, (July 2021).
DOI: 10.1155/2021/9960998
Google Scholar
[24]
A. Shamir, How to share a secret Communications of the ACM, 22, pp.612-613, (November 1979).
Google Scholar