|
X. Chai, Y. Chen, and L. Broyde, “A Novel Chaos-based Image Encryption Algorithm using DNA Sequence Operations,” Optics & Lasers in Engineering, Vol. 88, pp. 197-213, 2017
|
|
R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I. F. Isnin, “A Novel Chaotic based Image Encryption using a Hybrid Model of Deoxyribonucleic Acid and Cellular Automata,” Optics & Lasers in Engineering, Vol. 71, pp. 33-41, 2015
|
|
X. Wang, J. Zhao, and H. Liu, “A New Image Encryption Algorithm based on Chaos,” Optics Communications, Vol. 285, No. 5, pp. 562-566, 2012
|
|
F. ?zkaynak and S. Yavuz, “Analysis and Improvement of a Novel Image Fusion Encryption Algorithm based on DNA Sequence Operation and Hyper-chaotic System,” Nonlinear Dynamics, Vol. 78, No. 2, pp. 1311-1320, 2014
|
|
L. Kong and L. Li, “A New Image Encryption Algorithm based on Chaos,” in Proceedings of 35th Chinese Control Conference (CCC), pp. 4932-4937, 2016
|
|
F. ?zkaynak, A. B. ?zer, and S. Yavuz, “Security Analysis of an Image Encryption Algorithm based on Chaos and DNA Encoding,” in Proceedings of Signal Processing and Communications Applications Conference (SIU), pp. 1-4, 2013
|
|
B. Santhosh and K. Viswanath, “A Novel Public Key Cryptosystem for Medical Images,” in Proceedings of International Conference on Inventive Systems and Control (ICISC), pp. 1-4, 2017
|
|
K. Gupta, S. Silakari, R. Gupta, and S. A. Khan, “An Ethical Way of Image Encryption using ECC,” in Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN), pp. 342-345, 2009
|
|
A. Soleymani, J. Nordin, A. N. Hoshyar, Z. M. Ali, and E. Sundararajan, “An Image Encryption Scheme based on Elliptic Curve and a Novel Mapping Method,” International Journal of Digital Content Technology & its Applications, Vol. 7, No. 13, pp. 85, 2013
|
|
F. Wang, X. Q. Zhang, and G. L. Zhu, “A Block Image Element Encryption Algorithm based on ECC,” Communications Technology, Vol. 41, No. 3, pp. 82-84, 2008
|
|
L. J. Chen and A. D. Shen, “A Novel Public Key Image Cryptosystem based on Elliptic Curve and Arnold Cat Map,” Advanced Materials Research, Vol. 989-994, pp. 4183-4186, 2014
|
|
M. Kumar, A. Iqbal, and P. Kumar, “A New RGB Image Encryption Algorithm based on DNA Encoding and Elliptic Curve Diffie–hellman Cryptography,” Signal Processing, Vol. 125, No. C, pp. 187-202, 2016
|
|
B. Acharya, S. K. Patra, and G. Panda, “Image Encryption by Novel Cryptosystem using Matrix Transformation,” in Proceedings of International Conference on Emerging Trends in Engineering and Technology, pp. 77-81, 2008
|
|
R. Mahendran and K. Mani, “Generation of Key Matrix for Hill Cipher Encryption using Classical Cipher,” in Proceedings of World Congress on Computing and Communication Technologies (WCCCT), pp. 51-54, 2017
|
|
K. D. Patel and S. Belani, “Image Encryption using Different Techniques,” International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 1, pp. 30-34, 2011
|
|
A. A. A. Gutub and F. A. A. Khan, “Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems,” in Proceedings of International Conference on Advanced Computer Science Applications and Technologies, pp. 116-121, 2013
|
|
X. Wang and M. Wang, “A Hyperchaos Generated from Lorenz System,” Physica A Statistical Mechanics & its Applications, Vol. 387, No. 14, pp. 3751-3758, 2008
|
|
R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based Image Encryption using a Hybrid Genetic Algorithm and a DNA Sequence,” Optics & Lasers in Engineering, Vol. 56, No. 5, pp. 83-93, 2014
|
|
H. Liu, X. Wang, and A. Kadir, “Image Encryption using DNA Complementary Rule and Chaotic Maps,” Applied Soft Computing Journal, Vol. 12, No. 5, pp. 1457-1466, 2012
|
|
I. I. Cisse, H. Kim, and T. Ha, “A Rule of Seven in Watson-Crick base Pairing of Mismatched Sequences,” Nature Structural & Molecular Biology, Vol. 19, No. 6, pp. 623-627, 2012
|
|
R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A Novel Chaos-based Image Encryption using DNA Sequence Operation and Secure Hash Algorithm SHA-2,” Nonlinear Dynamics, Vol. 83, No. 3, pp. 1-14, 2015
|
|
G. Cui, Y. Liu, X. Zhang, and Z. Zhou, “A New Image Encryption Algorithm based on DNA Dynamic Encoding and Hyper-Chaotic System,” in Proceedings of International Conference on Bio-Inspired Computing: Theories and Applications, pp. 286-303, 2017
|
|
B. K. Alese, E. D. Philemon, and S. O. Falaki, “Comparative Analysis of Public-Key Encryption Schemes,” International Journal of Engineering & Technology, Vol. 2, No. 9, pp. 1552-1568, 2012
|
|
J. Hoffstein, J. Pipher, and J. H. Silverman, “An Introduction to Mathematical Cryptography,” 2nd Edition, Springer Publishing Company, 2014
|