[1] K. Wong, B. Kwok,C. Yuen, “An Efficient Diffusion Approach for Chaos-based Image Encryption,” Chaos, Solitons & Fractals, Vol. 41, No. 5, pp. 2652-2663, 2009 [2] A. Akhshani, S. Behnia, A. Akhavan, H. Abu Hassan,Z. Hassan, “A Novel Scheme for Image Encryption based on 2D Piecewise Chaotic Maps,” Optics Communications, Vol. 283, No. 17, pp. 3259-3266, 2010 [3] C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M.Lau, C. K. Tse, et al., “An Efficient and Secure Medical Image Protection Scheme based on Chaotic Maps,” Computers in Biology and Medicine, Vol. 43, No. 8, pp. 1000-1010, 2013 [4] Y. Zhou, L. Bao,C. Chen, “A New 1D Chaotic System for Image Encryption,”Signal Processing, Vol. 97, pp. 172-182, 2014 [5] A. Kanso and M. Ghebleh, “An Efficient and Robust Image Encryption Scheme for Medical Applications,” Communications in Nonlinear Science and Numerical Simulation, Vol. 24, No. 1, pp. 98-116, 2015 [6] C. Fu, G. Zhang, O. Bian, W. M. Lei,H. F. Ma, “A Novel Medical Image Protection Scheme using a 3-Dimensional Chaotic System,” PloS One, Vol. 9, No. 12, pp. e115773, 2014 [7] M. Boussif, N. Aloui,A. Cherif, “Smartphone Application for Medical Images Secured Exchange based on Encryption using the Matrix Product and the Exclusive Addition,” IET Image Processing, Vol. 11, No. 11, pp. 1020-1026, 2017 [8] J. Yoon and H. Kim, “An Image Encryption Scheme with a Pseudorandom Permutation based on Chaotic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 12, pp. 3998-4006, 2010 [9] S. Seyedzadeh and S. Mirzakuchaki, “A Fast Color Image Encryption Algorithm based on Coupled Two-Dimensional Piecewise Chaotic Map,” Signal Processing, Vol. 92, No. 5, pp. 1202-1215, 2012 [10] T. Xiang, C. Y. Yu, J. Y. Qu,X. S. Luo, “Research on the Security of DICOM Medical Images based on Improved AES Encryption Algorithm,” Dianzi Xuebao (Acta Electronica Sinica), Vol. 40, No. 2, pp. 406-411, 2012 [11] M. F. Pasha, S. Supramaniam, K. K. Liang, M. A. Amran, B. A. Chandra,R. Mandava, “An Android-based Mobile Medical Image Viewer and Collaborative Annotation: Development Issues and Challenges,”International Journal of Digital Content Technology and its Applications (JDCTA), No. 6, pp. 208-217, 2012 [12] D. Ravichandran, P. Praveenkumar, J. Rayappan,R. Amirtharajan, “Chaos based Crossover and Mutation for Securing DICOM Image,”Computers in Biology and Medicine, Vol. 72, pp. 170-184, 2016 [13] J. Chandrasekaran and S. Thiruvengadam, “A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images,”Security and Communication Networks, No. 3, pp. 1-12, 2017 [14] M. Rostami, A. Shahba, S. Saryazdi,H. Nezamabadi-pour, “A Novel Parallel Image Encryption with Chaotic Windows based on Logistic Map,”Computers & Electrical Engineering, Vol. 62, pp. 384-400, 2017 [15] V. Patidar, N. Pareek, G. Purohit,K. K. Sud, “Modified Substitution-Diffusion Image Cipher using Chaotic Standard and Logistic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 10, pp. 2755-2765, 2010 [16] G. Jiao, X. Peng,K. Duan, “Image Encryption with the Cross Diffusion of Two Chaotic Maps,” KSII Transactions on Internet and Information Systems, Vol. 13, No. 2, pp. 1064-1079, 2019 [17] Y. Dai and X. Wang, “Medical Image Encryption based on a Composition of Logistic Maps and Chebyshev Maps,” in Proceedings of 2012 IEEE International Conference on Information and Automation, pp. 210-214, 2012 [18] H. Lai, M. Orgun, J. Pieprzyk, J. Li, M. X. Luo, J. H. Xiao, et al., “High-Capacity Quantum Key Distribution using Chebyshev-Map Values Corresponding to Lucas Numbers Coding,” Quantum Information Processing, Vol. 15, No. 11, pp. 4663-4679, 2016 [19] M. Parvees, J. Samath,B. Bose, “Secured Medical Images a Chaotic Pixel Scrambling Approach,” Journal of Medical Systems, Vol. 40, No. 11, pp. 232, 2016 [20] M. Dzwonkowski, M. Papaj,R. Rykaczewski, “A New Quaternion-based Encryption Method for DICOM Images,” IEEE Transactions on Image Processing, Vol. 24, No. 11, pp. 4614-4622, 2015 |