[1] |
EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science,2014, 10(7): 1222-1230.
|
[2] |
NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67-74.
|
[3] |
YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1):82-92.
|
[4] |
KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J].International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30-38.
|
[5] |
CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express,2014, 22(6): 7349-7361.
|
[6] |
ALGHAMDI A S, ULLAH H. A secure Iris image encryption technique using bio-chaotic algorithm [J]. International Journal of Computer and Network Security,2010, 2(4): 78-84.
|
[7] |
ALGHAMDI A S, ULLAH H, MAHMUD M, et al. Bio-chaotic stream cipher-based Iris image encryption [C]//2009 International Conference on Computational Science and Engineering. Vancouver, BC, Canada:IEEE, 2009: 739-744.
|
[8] |
SUN Y Y, CHEN L N, XU R D, et al. An image encryption algorithm utilizing Julia sets and Hilbert curves[J]. PLoS One, 2014, 9(1): e84655.
|
[9] |
ARUL MURUGAN C, KARTHIGAIKUMAR P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms[J]. Mobile Networks and Applications, 2018.https://doi.org/10.1007/s11036-018-1058-3 (published online).
|
[10] |
DAWAHDEH Z E, YAAKOB S N, RAZIF BIN OTHMAN R. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].Journal of King Saud University-Computer and Information Sciences, 2018, 30(3): 349-355.
|
[11] |
YASSER I, KHALIFA F, MOHAMED M A, et al. A new image encryption scheme based on hybrid chaotic maps [J]. Complexity, 2020, 2020: 1-23.
|
[12] |
ES-SABRY M, EL AKKAD N, MERRAS M, et al. A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators[J]. Soft Computing, 2020, 24(5): 3829-3848.
|