Ping Ping, Feng Xu, Xin Lv, Yingchi Mao, and Rongzhi Qi
[1] W. Ding, W. Yan, and D. Qi, Digital image scrambling technology based on Arnold transformation, Journal of Computer-Aided Design & Computer Graphics, 13(4), 2001, 339–341. [2] G. Chen, Y. Mao, and C.K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21(3), 2004, 749–761. [3] Z. Guan, F. Huang, and W. Guan, Chaos-based image encryption algorithm, Physics Letters A, 346(1–3), 2005, 153–157. [4] Z.L. Zhu, W. Zhang, K. Wong, and H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences, 181(6), 2011, 1171–1186. [5] S.G. Lian, J. Sun, and Z. Wang, Security analysis of a chaos-based image encryption algorithm, Physica A, 351(2), 2005, 645–661. [6] C.M. Wu, An improved discrete Arnold transform and itsapplication in image scrambling and encryption, Acta Physica Sinica, 63(9), 2014, 090504-972. [7] D. Xiao, X.F. Liao, and P.C. Wei, Analysis and improvement of a chaos-based image encryption algorithm, Chaos, Solitons & Fractals, 40(5), 2009, 2191–2199. [8] Y.Q. Zhang and X.Y. Wang, Analysis and improvement of achaos-based symmetric image encryption scheme using a bit-level permutation, Nonlinear Dynamics, 77(3), 2014, 687–698. [9] J. Zou, R.K. Ward, and D. Qi, A new digital image scrambling method based on Fibonacci numbers, Proceedings of the IEEE International Symposium on Circuits and Systems, Vancouver, Canada, 2004, 965–968. [10] W. Zou, J. Huang, and C. Zhou, Digital image scrambling technology based on two dimension Fibonacci transformation and its periodicity, Proceedings of the Third International Symposium on Information Science and Engineering, Shanghai, China, 2010, 415–418. [11] A.A. Ravankar and S.G. Sedukhin, Image scrambling based on a new linear transform, Proceedings of the International Conference on Multimedia Technology, Hangzhou, China, 2011, 3105–3108. [12] H. Wang, X. Cheng, Y. Li, and C. Wang, Optimal iterative learning control for general nonlinear systems with uncertain parameters, Control and Intelligent Systems, 43(1), 2015, 50–55. [13] C.Y. Lai, X. Cheng, and T.H. Lee, Input-output transition models for discrete-time switched linear and nonlinear systems, Control and Intelligent Systems, 39(1), 2011, 47–59. [14] D. Qi, J. Zou, and X. Han, A new class of scramblingtransformation and its application in the image informationcovering, Science in China Series E: Technological Sciences, 43(3), 2000, 304–312. [15] T. Liu and L. Min, Discussion of a chaotic image scrambling algorithm based on sort transformation, Journal of University of Science and Technology Beijing, 32(5), 2010, 673–681. [16] W. Ding, W. Yan, and D. Qi, Digital image scrambling and digital watermarking technology based on Conway’s Game,Journal of North China University of Technology, 12(1), 2000, 1–5. [17] F. Qadir, M.A. Peer, and K.A. Khan, Digital image scrambling based on two dimensional cellular automata, International Journal of Computer Network & Information Security, 5(2), 2013, 36–41. [18] D. Eppstein, Growth and decay in life-like cellular automata, in A. Adamatzky (ed.), Game of life cellular automata (London:Springer Press, 2010), 71–97. [19] X. Huang and G. Ye, An efficient self-adaptive model forchaotic image encryption algorithm, Communications inNonlinear Science & Numerical Simulations, 19(12), 2014,4094–4104. [20] X.W. Li, S.T. Kim, and I.K. Lee, Color image encryption using a high-quality elemental image array, Optics Communications, 332(4), 2014, 75–82.
Important Links:
Go Back