[1] S. Som and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaos”, Procedia Technology, vol. 10, pp. 663-671, 2013/01/01/ 2013.
[2] J. S. Khan and J. Ahmad, “Chaos based efficient selective image encryption”, Multidimensional Systems and Signal Processing, vol. 30, no. 2, pp. 943-961, 2019/04/01 2019.
[3] G. Gu and J. Ling, “A fast image encryption method by using chaotic 3D cat maps”, Optik, vol. 125, no. 17, pp. 4700-4705, 2014/09/01/ 2014.
[4] M. Kaur and V. Kumar, “A comprehensive review on image encryption techniques”, Archives of Computational Methods in Engineering, vol. 27, no. 1, pp. 15-43, 2020/01/01 2020.
[5] D. Zareai, M. Balafar, and M. R. Feizi Derakhshi, “A new grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking”, Multimedia Tools and Applications, vol. 80, no. 12, pp. 18317-18344, 2021/05/01 2021.
[6] S. Lian, J. Sun, and Z. Wang, “A block cipher based on a suitable use of the chaotic standard map”, Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117-129, 2005/10/01/ 2005.
[7] N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006/09/01/ 2006.
[8] S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps”, Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408-419, 2008/01/01/ 2008.
[9] T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos”, Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008/01/21/ 2008.
[10] A. Shokouh Saljoughi and H. Mirvaziri, “A new method for image encryption by 3D chaotic map”, Pattern Analysis and Applications, vol. 22, no. 1, pp. 243-257, 2019/02/01 2019.
[11] M. Kaur and D. Singh, “Multi objective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption”, Multidimensional Systems and Signal Processing, vol. 32, no. 1, pp. 281-301, 2021/01/01 2021.
[12] M. Kalra, S. Katyal, and R. Singh, “A tent map and logistic map based approach for chaos-based image encryption and decryption”, Innovations in Computer Science and Engineering: Springer, 2019, pp. 159-165.
[13] Y. Luo, J. Yu, W. Lai, and L. Liu, “A novel chaotic image encryption algorithm based on improved baker map and logistic map”, Multimedia Tools and Applications, vol. 78, no. 15, pp. 22023-22043, 2019/08/01 2019.
[14] W. Gao, J. Sun, W. Qiao, and X. Zhang, “Digital image encryption scheme based on generalized Mandelbrot-Julia set”, Optik, vol. 185, pp. 917-929, 2019/05/01/ 2019.
[15] D. Ravichandran, A. Banu S, B. K. Murthy, V. Balasubramanian, S. Fathima, and R. Amirtharajan, “An efficient medical image encryption using hybrid DNA computing and chaos in transform domain”, Medical & Biological Engineering & Computing, vol. 59, no. 3, pp. 589-605, 2021/03/01 2021.
[16] H. Liu, F. Wen, and A. Kadir, “Construction of a new 2D Chebyshev-Sine map and its application to color image encryption”, Multimedia Tools and Applications, vol. 78, no. 12, pp. 15997-16010, 2019/06/01 2019.
[17] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations”, Optics and Lasers in Engineering, vol. 88, pp. 197-213, 2017/01/01/ 2017.
[18] P. Mani, R. Rajan, L. Shanmugam, and Y. Hoon Joo, “Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption”, Information Sciences, vol. 491, pp. 74-89, 2019/07/01/ 2019.
[19] H. Liu, B. Zhao, and L. J. E. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling”, Entropy, vol. 21, no. 4, p. 343, 2019.
[20] A. M. Shaheen, T. R. Sheltami, T. M. AlKharoubi, and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT”, Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 12, pp. 4733-4750, 2019/12/01 2019.
[21] A. Firdous, A. U. Rehman, and M. M. S. J. I. A. Missen, “A gray image encryption technique using the concept of water waves, chaos and hash function”, IEEE, vol. 9, pp. 11675-11693, 2021.
[22] Y. Zhou, C. Li, W. Li, H. Li, W. Feng, and K. Qian, “Image encryption algorithm with circle index table scrambling and partition diffusion”, Nonlinear Dynamics, vol. 103, no. 2, pp. 2043-2061, 2021/01/01 2021.
[23] M. Wang, X. Wang, T. Zhao, C. Zhang, Z. Xia, and N. Yao, “Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme”, Information Sciences, vol. 544, pp. 1-24, 2021/01/12/ 2021.
[24] F. Musanna, D. Dangwal, and S. Kumar, “Novel image encryption algorithm using fractional chaos and cellular neural network”, Journal of Ambient Intelligence and Humanized Computing, 2021/03/06 2021.
[25] X. Wang and S. Gao, “A chaotic image encryption algorithm based on a counting system and the semi-tensor product”, Multimedia Tools and Applications, vol. 80, no. 7, pp. 10301-10322, 2021/03/01 2021.
[26] M. Dua, A. Suthar, A. Garg, and V. Garg, “An ILM-cosine
transform-based improved approach to image encryption”, Complex & Intelligent Systems, vol. 7, no. 1, pp. 327-343, 2021/02/01 2021.
[27] B. Bouteghrine, C. Tanougast, and S. Sadoudi, “Novel image encryption algorithm based on new 3-d chaos map”, Multimedia Tools and Applications, vol. 80, no. 17, pp. 25583-25605, 2021/07/01 2021.
[28] C. E. J. T. B. s. t. j. Shannon, “Communication theory of secrecy systems”, IEEE, vol. 28, no. 4, pp. 656-715, 1949.
[29] M. Ghebleh, A. Kanso, and H. Noura, “An image encryption scheme based on irregularly decimated chaotic maps”, Signal Processing: Image Communication, vol. 29, no. 5, pp. 618-627, 2014/05/01/ 2014.
[30] Z. Parvin, H. Seyedarabi, and M. Shamsi, “A new secure and sensitive image encryption scheme based on new substitution with chaotic function”, Multimedia Tools and Applications, vol. 75, no. 17, pp. 10631-10648, 2016/09/01 2016.
[31] R. Aqeel ur, X. Liao, A. Kulsoom, and S. Ullah, “A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps”, Multimedia Tools and Applications, vol. 75, no. 18, pp. 11241-11266, 2016/09/01 2016.
[32] A. ur Rehman, D. Xiao, A. Kulsoom, M. A. Hashmi, and S. A. Abbas, “Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules”, Multimedia Tools and Applications, vol. 78, no. 7, pp. 9355-9382, 2019/04/01 2019.
[33] R. Aqeel ur, X. Liao, M. A. Hahsmi, and R. Haider, “An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos”, Optik - International Journal for Light and Electron Optics, vol. 153, pp. 117-134, 2018/01/01/ 2018.
[34] A. ur Rehman, X. Liao, A. Kulsoom, and S. A. Abbas, “Selective encryption for gray images based on chaos and DNA complementary rules”, Multimedia Tools and Applications, vol. 74, no. 13, pp. 4655-4677, 2015/07/01 2015.
[35] X. Huang and G. Ye, “An image encryption algorithm based on hyper-chaos and DNA sequence”, Multimedia Tools and Applications, vol. 72, no. 1, pp. 57-70, 2014/09/01 2014.
[36] P. Zhen, G. Zhao, L. Min, and X. Jin, “Chaos-based image encryption scheme combining DNA coding and entropy,” Multimedia Tools and Applications, vol. 75, no. 11, pp. 6303-6319, 2016/06/01 2016.
[37] A. A. Abd El-Latif and X. Niu, “A hybrid chaotic system and cyclic elliptic curve for image encryption,” AEU - International Journal of Electronics and Communications, vol. 67, no. 2, pp. 136-143, 2013/02/01/ 2013.
[38] M. Asgari-Chenaghlu, M. A. Balafar, and M. R. Feizi-Derakhshi, “A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, pp. 1-13, 2019/04/01/ 2019.