[1] N.-R. Zhou, L.-J. Tong and W.-P. Zou, "Multi-image Encryption Scheme with Quaternion DiscreteFractional Tchebyshev Moment Transform and Cross-coupling Operation," Signal Processing, vol. 211, p. 109107, 2023.
[2] E. Yavuz, "A Novel Chaotic Image Encryption Algorithm Based on Content-sensitive Dynamic FunctionSwitching Scheme," Optics & Laser Technology, vol. 114, pp. 224-239, 2019.
[3] M. Akraam, T. Rashid and S. Zafar, "A Chaos-based Image Encryption Scheme is Proposed UsingMultiple Chaotic Maps," Mathematical Problems in Engineering, vol. 2023, DOI: 10.1155/2023/2003724, 2023.
[4] J. Fridrich, Steganography in Digital Media: Principles, Algorithms and Applications, DOI:10.1017/CBO9781139192903, Cambridge University Press, 2009.
[5] J. Buchmann, Introduction to Cryptography, 2nd Edn, ISBN: 0387207562, Springer, 2004.
[6] S. Toughi, M. H. Fathi and Y. A. Sekhavat, "An Image Encryption Scheme Based on Elliptic CurvePseudo Random and Advanced Encryption System," Signal Processing, vol. 141, pp. 217-227, 2017.
[7] E. Tromer, D. A. Osvik and A. Shamir, "Efficient Cache Attacks on AES and Countermeasures," Journalof Cryptology, vol. 23, pp. 37-71, 2010.
[8] R. Shivhare, R. Shrivastava and C. Gupta, "An Enhanced Image Encryption Technique Using DESAlgorithm with Random Image Overlapping and Random Key Generation," Proc. of the 2018 IEEE Int. Conf. on Advanced Computation and Telecommunication (ICACAT), pp. 1-9, Bhopal, India, 2018.
[9] Q. Zhang and Q. Ding, "Digital Image Encryption Based on Advanced Encryption Standard (AES),"Proc. of the 2015 5th IEEE Int. Conf. on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp. 1218-1221, Qinhuangdao, China, 2015.
[10] H. Kolivand, S. F. Hamood, S. Asadianfam and M. S. Rahim, "Image Encryption Techniques: AComprehensive Review," Multimedia Tools and Applications, pp. 1-36, DOI: 10.1007/s11042-023-17896-0, 2024.
[11] U. Zia et al., "Survey on Image Encryption Techniques Using Chaotic Maps in Spatial, Transform andSpatiotemporal Domains," Int. Journal of Information Security, vol. 21, pp. 917-935, 2022.
[12] R. Matthews, "On the Derivation of a “Chaotic” Encryption Algorithm," Cryptologia, vol. 13, pp. 29-42,1989.
[13] B. Yang and X. Liao, "A New Color Image Encryption Scheme Based on Logistic Map over the FiniteField ZN," Multimedia Tools and Applications, vol. 77, pp. 21803-21821, 2018.
[14] L. Meng, S. Yin, C. Zhao, H. Li and Y. Sun, "An Improved Image Encryption Algorithm Based onChaotic Mapping and Discrete Wavelet Transform Domain," Int. Journal of Network Security, vol. 22, pp. 155-160, 2020.
[15] B. Mondal, S. Singh and P. Kumar, "A Secure Image Encryption Scheme Based on Cellular Automataand Chaotic Skew Tent Map," Journal of Information Security and Applications, vol. 45, pp. 117-130, 2019.
[16] D. S. Malik and T. Shah, "Color Multiple Image Encryption Scheme Based on 3D-Chaotic Maps,"Mathematics and Computers in Simulation, vol. 178, pp. 646-666, 2020.
[17] Y. Qobbi, A. Jarjar, M. Essaid and A. Benazzi, "Image Encryption Algorithm Using DynamicPermutation and Large Chaotic S-Box," Multimedia Tools and Appli., vol. 82, pp. 18545-18564, 2023.
[18] V. Kumar and A. Girdhar, "A 2D Logistic Map and Lorenz-Rossler Chaotic System Based RGB ImageEncryption Approach," Multimedia Tools and Applications, vol. 80, pp. 3749-3773, 2021.
[19] B. Rahul, K. Kuppusamy and A. Senthilrajan, "Dynamic DNA Cryptography-based Image EncryptionScheme Using Multiple Chaotic Maps and SHA-256 Hash Function," Optik, vol. 289, p. 171253, 2023.
[20] T. Li, B. Du and X. Liang, "Image Encryption Algorithm Based on Logistic and Two-dimensionalLorenz," IEEE Access, vol. 8, pp. 13792-13805, 2020.
[21] Y. Niu, Z. Zhou and X. Zhang, "An Image Encryption Approach Based on Chaotic Maps and GeneticOperations," Multimedia Tools and Applications, vol. 79, pp. 25613-25633, 2020.
[22] J. Wu, X. Liao and B. Yang, "Image Encryption Using 2D Hénon-Sine Map and DNA Approach," SignalProcessing, vol. 153, pp. 11-23, 2018.
[23] U. K. Gera and S. Agrawal, "Image Encryption Using a Combination of 4D Discrete Hyperchaotic Mapand DNA Encoding," Multimedia Tools and Applications, vol. 83, pp. 38037-38054, 2023.
[24] Y. Wan, S. Gu and B. Du, "A New Image Encryption Algorithm Based on Composite Chaos andHyperchaos Combined with DNA Coding," Entropy, vol. 22, p. 171, 2020.
[25] R. Enayatifar, A. H. Abdullah and I. F. Isnin, "Chaos-based Image Encryption Using a Hybrid Genetic Algorithm and a DNA Sequence," Optics and Lasers in Engineering, vol. 56, pp. 83-93, 2014.
[26] H. Liu, L. Teng, Y. Zhang, R. Si and P. Liu, "Mutil-medical Image Encryption by a New Spatiotemporal Chaos Model and DNA New Computing for Information Security," Expert Systems with Applications, vol. 235, p. 121090, 2024.
[27] Q. Lai, L. Yang, G. Hu, Z.-H. Guan and H. H.-C. Iu, "Constructing Multiscroll Memristive Neural Network with Local Activity Memristor and Application in Image Encryption," IEEE Transactions on Cybernetics, vol. 54, no. 7, pp. 4039-4048, 2024.
[28] Q. Lai, L. Yang and G. Chen, "Design and Performance Analysis of Discrete Memristive Hyperchaotic Systems with Stuffed Cube Attractors and Ultraboosting Behaviors," IEEE Transactions on Industrial Electronics, vol. 71, no. 7, pp. 7819-7828, 2023.
[29] P. Liu, X. Wang, X. Zhao and S. Unar, "Target-based Image Encryption via Infinite Interval Chaotic System with Ill-conditioned Parameter and 3DBDM," Expert Systems with Applications, vol. 232, p. 120811, 2023.
[30] P. Liu, X. Wang and Y. Su, "Image Encryption via Complementary Embedding Algorithm and New Spatiotemporal Chaotic System," IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, pp. 2506-2519, 2022.
[31] X. Wang and P. Liu, "A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, pp. 1291-1301, 2021.
[32] P. Liu, X. Wang, Y. Su, H. Liu and S. Unar, "Globally Coupled Private Image Encryption Algorithm Based on Infinite Interval Spatiotemporal Chaotic System," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 70, pp. 2511-2522, 2023.
[33] Q. Lai and Y. Liu, "A Cross-channel Color Image Encryption Algorithm Using Two-dimensional Hyperchaotic Map," Expert Systems with Applications, vol. 223, p. 119923, 2023.
[34] R. B. Naik and U. Singh, "A Review on Applications of Chaotic Maps in Pseudo-random Number Generators and Encryption," Annals of Data Science, vol. 11, pp. 25-50, 2024.
[35] C. Li, G. Luo, K. Qin and C. Li, "An Image Encryption Scheme Based on Chaotic Tent Map," Nonlinear Dynamics, vol. 87, pp. 127-133, 2017.
[36] X. Wang and C. Jin, "Image Encryption Using Game of Life Permutation and PWLCM Chaotic System," Optics Communications, vol. 285, pp. 412-417, 2012.
[37] I. I. Cisse, H. Kim and T. Ha, "A Rule of Seven in Watson-Crick Base-pairing of Mismatched Sequences," Nature Structural & Molecular Biology, vol. 19, pp. 623-627, 2012.
[38] R. Enayatifar, F. G. Guimarães and P. Siarry, "Index-based Permutation-diffusion in Multiple-image Encryption Using DNA Sequence," Optics and Lasers in Engineering, vol. 115, pp. 131-140, 2019.
[39] L. Liu, Y. Lei and D. Wang, "A Fast Chaotic Image Encryption Scheme with Simultaneous Permutation-Diffusion Operation," IEEE Access, vol. 8, pp. 27361-27374, 2020.
[40] Y. Wu, J. P. Noonan and S. Agaian, "NPCR and UACI Randomness Tests for Image Encryption," Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), vol. 1, pp. 31-38, 2011.
[41] Y. Qobbi, A. Jarjar, M. Essaid and A. Benazzi, "Image Encryption Algorithm Based on Genetic Operations and Chaotic DNA Encoding," Soft Computing, vol. 26, pp. 5823-5832, 2022.
[42] X. Chai, Z. Gan, K. Yang, Y. Chen and X. Liu, "An Image Encryption Algorithm Based on the Memristive Hyperchaotic System, Cellular Automata and DNA Sequence Operations," Signal Processing: Image Communication, vol. 52, pp. 6-19, 2017.