|
[1]O. F. Mohammad, M. S. M. Rahim, S. R. M. Zeebaree, and F. Ahmed, "A survey and analysis of the image encryption methods," International Journal of Applied Engineering Research, vol. 12, no. 23, pp. 13265-13280, 2017. [2]D. Arroyo, G. Alvarez, and V. Fernandez, "A basic framework for the cryptanalysis of digital chaos-based cryptography," in 2009 6th International Multi-Conference on Systems, Signals and Devices, 2009: IEEE, pp. 1-6. [3]L. Kocarev, "Chaos-based cryptography: a brief overview," IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001. [4]N. Thein, H. A. Nugroho, T. B. Adji, and I. W. Mustika, "Comparative performance study on ordinary and chaos image encryption schemes," in 2017 international conference on advanced computing and applications (ACOMP), 2017: IEEE, pp. 122-126. [5]B. Jasra and A. H. Moon, "Image encryption techniques: A review," in 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2020: IEEE, pp. 221-226. [6]K. Mohamed, M. N. M. Pauzi, F. H. H. M. Ali, S. Ariffin, and N. H. N. Zulkipli, "Study of S-box properties in block cipher," in 2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014: IEEE, pp. 362-366. [7]Z.-q. Du, Q.-j. Xu, J. Zhang, and M. Li, "Design and analysis of dynamic S-box based on Feistel," in 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2015: IEEE, pp. 590-594. [8]G. Wang, S. Luo, L. He, and G. Yin, "A method for design and analysis of S-box based on Logistic maps," in Proceedings of 2012 2nd International Conference on Computer Science and Network Technology, 2012: IEEE, pp. 826-829. [9]W. J. Jun and T. S. Fun, "A new image encryption algorithm based on single S-box and dynamic encryption step," IEEE Access, vol. 9, pp. 120596-120612, 2021. [10]M. S. Fadhil, A. K. Farhan, and M. N. Fadhil, "Designing substitution box based on the 1D logistic map chaotic system," in IOP Conference Series: Materials Science and Engineering, 2021, vol. 1076, no. 1: IOP Publishing, p. 012041. [11]J. Juremi, R. Mahmod, and S. Sulaiman, "A proposal for improving AES S-box with rotation and key-dependent," in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012: IEEE, pp. 38-42. [12]A. R. Alharbi, S. S. Jamal, M. F. Khan, M. A. Gondal, and A. A. Abbasi, "Construction and optimization of dynamic S-boxes based on gaussian distribution," IEEE Access, vol. 11, pp. 35818-35829, 2023. [13]S.-Y. FAN, "基於 Triple DES 及 Logistic map 之影像加密方法," 中原大學電機工程學系學位論文, vol. 2022, pp. 1-53, 2022. [14]N. Mouha and N. Mouha, Review of the advanced encryption standard. US Department of Commerce, National Institute of Standards and Technology, 2021. [15]A. F. Kadhim and Z. A. Kamal, "Dynamic S-BOX base on primitive polynomial and chaos theory," in 2018 International Conference on Engineering Technology and their Applications (IICETA), 2018: IEEE, pp. 7-12. [16]M. M. Dimitrov, "On the design of chaos-based S-boxes," IEEE Access, vol. 8, pp. 117173-117181, 2020. [17]S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian, M. F. Abu-ElYazeed, and A. M. Soliman, "Generalized delayed logistic map suitable for pseudo-random number generation," in 2015 International Conference on Science and Technology (TICST), 2015: IEEE, pp. 327-331. [18]G. Zaibi, A. Kachouri, F. Peyrard, and D. Fournier-Prunaret, "On dynamic chaotic S-Box," in 2009 Global Information Infrastructure Symposium, 2009: IEEE, pp. 1-5. [19]Y. Su, X. Tong, M. Zhang, and Z. Wang, "A new S-box three-layer optimization method and its application," Nonlinear Dynamics, vol. 111, no. 3, pp. 2841-2867, 2023. [20]D. Wang and Y.-B. Zhang, "Image encryption algorithm based on S-boxes substitution and chaos random sequence," in 2009 International Conference on Computer Modeling and Simulation, 2009: IEEE, pp. 110-113. [21]H.-Y. Hsiao, "渾沌影像加密之研究," 中原大學電機工程研究所學位論文, vol. 2005, pp. 1-62, 2005. [22]J. Buchmann, Introduction to cryptography. Springer, 2004. [23]R. L. Rivest, "Cryptography," in Algorithms and complexity: Elsevier, 1990, pp. 717-755. [24]賴溪松, 韓亮, and 張真誠, 近代密碼學及其應用. 旗標, 2003. [25]M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, and Y. Khamayseh, "Comprehensive study of symmetric key and asymmetric key encryption algorithms," in 2017 international conference on engineering and technology (ICET), 2017: IEEE, pp. 1-7. [26]A. s. M. Reading. "密碼學(二):現代密碼學." https://aikawa0617.medium.com/%E5%AF%86%E7%A2%BC%E5%AD%B8-%E4%BA%8C-%E7%8F%BE%E4%BB%A3%E5%AF%86%E7%A2%BC%E5%AD%B8-4894326d357b (accessed July 13, 2024). [27]C. E. Shannon, "Communication theory of secrecy systems," The Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949. [28]D. E. Standard, "Data encryption standard," Federal Information Processing Standards Publication, vol. 112, p. 3, 1999. [29]D. Selent, "Advanced encryption standard," Rivier Academic Journal, vol. 6, no. 2, pp. 1-14, 2010. [30]W. Haryono, "Comparison encryption of how to work caesar cipher, hill cipher, blowfish and twofish," Data Science: Journal of Computing and Applied Informatics, vol. 4, no. 2, pp. 100-110, 2020. [31]S. Rubinstein-Salzedo and S. Rubinstein-Salzedo, "The vigenere cipher," Cryptography, pp. 41-54, 2018. [32]E. Milanov, "The RSA algorithm," RSA laboratories, pp. 1-11, 2009. [33]Wikipedia. "代換-置換網路." https://en.wikipedia.org/wiki/Substitution%E2%80%93permutation_network (accessed July 13, 2024). [34]P. Telagarapu, B. Biswal, and V. S. Guntuku, "Design and analysis of multimedia communication system," in 2011 Third International Conference on Advanced Computing, 2011: IEEE, pp. 193-197. [35]Y.-H. LI, "在 Arnold 變換的彩色影像以高頻 DCT 係數嵌入之數位水印演算法," 中原大學電機工程學系學位論文, vol. 2023, pp. 1-56, 2023. [36]E. A. Jameel and S. A. Fadhel, "Digital image encryption techniques: Article Review," 2022. [37]R. M. May, "Simple mathematical models with very complicated dynamics," Nature, vol. 261, no. 5560, pp. 459-467, 1976. [38]S. H. Strogatz, "Nonlinear dynamics and chaos," 1996.
|