
[1] S. Yao, L. Chen, G. Chang, and B. He, “A new optical encryption system for image transformation,” Optics & Laser Technology, vol. 97, pp. 234–241, 2017.
[2] J. Liu, T. Bai, X. Shen, S. Dou, C. Lin, and J. Cai, “Parallel encryption for multi channel images based on an optical joint transform correlator,” Optics Communica tions, vol. 396, pp. 174–184, 2017.
[3] M. R. Abuturab, “An asymmetric singlechannel color image encryption based on hartley transform and gyrator transform,” Optics and lasers in engineering, vol. 69, pp. 49–57, 2015.
[4] M. Joshi, C. Shakher, and K. Singh, “Image encryption and decryption using frac tional fourier transform and radial hilbert transform,” Optics and Lasers in Engi neering, vol. 46, no. 7, pp. 522–526, 2008.
[5] J. Jin, “An image encryption based on elementary cellular automata,” Optics and
Lasers in Engineering, vol. 50, no. 12, pp. 1836–1843, 2012.
[6] R.J. Chen, Y.H. Chen, C.S. Chen, and J.L. Lai, “Image encryption/decryption system using 2d cellular automata,” in Consumer Electronics, 2006. ISCE’06. 2006 IEEE Tenth International Symposium on, pp. 1–6, IEEE, 2006.
[7] R. Wei, X. Li, and Q.H. Wang, “Double color image encryption scheme based on offaxis holography and maximum length cellular automata,” OptikInternational Journal for Light and Electron Optics, vol. 145, pp. 407–417, 2017.
[8] J. Zhang, D. Hou, and H. Ren, “Image encryption algorithm based on dynamic dna coding and chen’s hyperchaotic system,” Mathematical Problems in Engineering, vol. 2016, 2016. [9] L. Liu, Q. Zhang, and X. Wei, “A rgb image encryption algorithm based on dna en coding and chaos map,” Computers & Electrical Engineering, vol. 38, no. 5, pp. 1240– 1248, 2012.
[10] X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on dna sequence operation and hyperchaotic system,” Journal of Systems and Software, vol. 85, no. 2, pp. 290–299, 2012.
[11] R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaosbased image encryption using a hybrid genetic algorithm and a dna sequence,” Optics and Lasers in Engineering, vol. 56, pp. 83–93, 2014.
[12] J. Zhang, D. Fang, and H. Ren, “Image encryption algorithm based on dna encoding and chaotic maps,” Mathematical Problems in Engineering, vol. 2014, 2014.
[13] P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia ap plications,” IEEE Transactions on consumer electronics, vol. 46, no. 3, pp. 395–403, 2000.
[14] S. Pathak, R. Kamble, and D. Chaursia, “An efficient data encryption standard image encryption technique with rgb random uncertainty,” in Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on, pp. 413–421, IEEE, 2014.
[15] Z. L. Lan, L. Zhu, Y. C. Li, and J. Liu, “A color image encryption algorithm based on improved des,” in Applied Mechanics and Materials, vol. 743, pp. 379–384, Trans Tech Publ, 2015.
[16] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, “A modified aes based algorithm for image encryption,” World Academy of Science, Engineering and Technology, vol. 27, pp. 206–211, 2007.
[17] S. H. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified version of advanced encryption standard based algorithm for image encryption,” in Electron ics and Information Engineering (ICEIE), 2010 International Conference On, vol. 1, pp. V1–141, IEEE, 2010. [18] A. A. Shtewi, B. E. M. Hasan, and A. Hegazy, “An efficient modified advanced encryption standard (maes) adapted for image cryptosystems,” IJCSNS International Journal of Computer Science and Network Security, vol. 10, no. 2, pp. 226–232, 2010.
[19] J. Li and H. Liu, “Colour image encryption based on advanced encryption standard algorithm with twodimensional chaotic map,” IET information security, vol. 7, no. 4, pp. 265–270, 2013.
[20] S. Toughi, M. H. Fathi, and Y. A. Sekhavat, “An image encryption scheme based on elliptic curve pseudo random and advanced encryption system,” Signal Processing, vol. 141, pp. 217–227, 2017.
[21] S. J. Shyu, “Image encryption by random grids,” Pattern Recognition, vol. 40, no. 3, pp. 1014–1031, 2007.
[22] S. J. Shyu, “Image encryption by multiple random grids,” Pattern Recognition, vol. 42, no. 7, pp. 1582–1596, 2009.
[23] T.H. Chen and K.C. Li, “Multiimage encryption by circular random grids,” Infor mation Sciences, vol. 189, pp. 255–265, 2012.
[24] X. Liu, Y. Cao, P. Lu, X. Lu, and Y. Li, “Optical image encryption technique based on compressed sensing and arnold transformation,” OptikInternational Journal for Light and Electron Optics, vol. 124, no. 24, pp. 6590–6593, 2013.
[25] N. Zhou, A. Zhang, F. Zheng, and L. Gong, “Novel image compression–encryption hybrid algorithm based on keycontrolled measurement matrix in compressive sens ing,” Optics & Laser Technology, vol. 62, pp. 152–160, 2014.
[26] D. Zhang, X. Liao, B. Yang, and Y. Zhang, “A fast and efficient approach to color image encryption based on compressive sensing and fractional fourier transform,” Multimedia Tools and Applications, vol. 77, no. 2, pp. 2191–2208, 2018.
[27] F. Hu, J. Wang, X. Xu, C. Pu, and T. Peng, “Batch image encryption using generated deep features based on stacked autoencoder network,” Mathematical Problems in Engineering, vol. 2017, 2017. [28] K. Loukhaoukha, J.Y. Chouinard, and A. Berdai, “A secure image encryption al gorithm based on rubik’s cube principle,” Journal of Electrical and Computer Engi neering, vol. 2012, p. 7, 2012.
[29] R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989.
[30] J. Fridrich, “Symmetric ciphers based on twodimensional chaotic maps,” Interna tional Journal of Bifurcation and chaos, vol. 8, no. 06, pp. 1259–1284, 1998.
[31] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on
3d chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[32] Y. Tang, Z. Wang, and J.a. Fang, “Image encryption using chaotic coupled map lattices with timevarying delays,” Communications in Nonlinear Science and Nu merical Simulation, vol. 15, no. 9, pp. 2456–2468, 2010.
[33] O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel subimage encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557– 566, 2012.
[34] S. M. Seyedzadeh, B. Norouzi, M. R. Mosavi, and S. Mirzakuchaki, “A novel color image encryption algorithm based on spatial permutation and quantum chaotic map,” Nonlinear Dynamics, vol. 81, no. 12, pp. 511–529, 2015.
[35] M. S. AlAni, “Efficient image encryption approach based on chaos technique,”
[36] Y. Wang, K.W. Wong, X. Liao, and G. Chen, “A new chaosbased fast image en cryption algorithm,” Applied soft computing, vol. 11, no. 1, pp. 514–522, 2011.
[37] X. Wang, J. Zhao, and H. Liu, “A new image encryption algorithm based on chaos,”
Optics Communications, vol. 285, no. 5, pp. 562–566, 2012.
[38] L. Xu, Z. Li, J. Li, and W. Hua, “A novel bitlevel image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, vol. 78, pp. 17–25, 2016.
[39] Y.Q. Zhang and X.Y. Wang, “A new image encryption algorithm based on non adjacent coupled map lattices,” Applied Soft Computing, vol. 26, pp. 10–20, 2015. [40] Y. Zhou, L. Bao, and C. P. Chen, “A new 1d chaotic system for image encryption,”
Signal processing, vol. 97, pp. 172–182, 2014.
[41] Z. Hua and Y. Zhou, “Image encryption using 2d logisticadjustedsine map,” Infor mation Sciences, vol. 339, pp. 237–253, 2016.
[42] H. Liu and X. Wang, “Color image encryption based on onetime keys and ro bust chaotic maps,” Computers & Mathematics with Applications, vol. 59, no. 10, pp. 3320–3327, 2010.
[43] E. N. Lorenz and P. Martin, “The essence of chaos,” Physics Today, vol. 48, p. 54,
1995.
[44] L. Burra, Chaotic dynamics in nonlinear theory. Springer, 2016.
[45] S. Josefsson, “The base16, base32, and base64 data encodings,” 2006. Available as
https://tools.ietf.org/html/rfc4648.
[46] X. Chai, K. Yang, and Z. Gan, “A new chaosbased image encryption algorithm with dynamic key selection mechanisms,” Multimedia Tools and Applications, vol. 76, no. 7, pp. 9907–9927, 2017.
[47] W. XingYuan and W. Qian, “A fast image encryption algorithm based on only blocks in cipher text,” Chinese physics B, vol. 23, no. 3, p. 030503, 2014.
[48] B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A novel image encryption based on hash function with only tworound diffusion process,” Multime dia systems, vol. 20, no. 1, pp. 45–64, 2014.
[49] X. Huang and G. Ye, “An image encryption algorithm based on hyperchaos and dna sequence,” Multimedia tools and applications, vol. 72, no. 1, pp. 57–70, 2014.
[50] X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Optics and Lasers in Engineering, vol. 66, pp. 10–18, 2015.
[51] Y. Li, C. Wang, and H. Chen, “A hyperchaosbased image encryption algorithm using pixellevel permutation and bitlevel permutation,” Optics and Lasers in En gineering, vol. 90, pp. 238–246, 2017. [52] H. Liu, X. Wang, et al., “Image encryption using dna complementary rule and chaotic maps,” Applied Soft Computing, vol. 12, no. 5, pp. 1457–1466, 2012.
