[1] National Bureau of Standards, “Data Encryption
Standard”, FIPS Publication 46, 1977.
[2] NIST, Recommendation for the Triple Data Encryption
Algorithm (TDEA) Block Cipher, Special Publication
800-67.
[3] Daemen, J., and Rijmen, V. "Rijndael: The Advanced
Encryption Standard", Dr. Dobb's Journal, 2001.
[4] Rivest, R.; A. Shamir; L. Adleman, "A Method for
Obtaining Digital Signatures and Public-Key
Cryptosystems", Communications of the ACM 21 (2),
1978, pp.120–126.
[5] Shuqun Zhang and Mohammed A. Karim, “Color
image encryption using double random phase
encoding”, Microwave and Optical Technology
Letters, 1999, vol. 21(5), pp.318-322.
[6] Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image
Encryption algorithm and its VLSI architecture”,
Pattern Recognition and Image Analysis, 2000, vol.10
(2), pp.236-247.
[7] S.S.Maniccam, N.G. Bourbakis, “Lossless image
compression and encryption using SCAN”, Pattern
Recognition (34), 2001, pp.1229- 1245.
[8] Chin-Chen Chang, Min-Shian Hwang, Tung-Shou
Chen, “A new encryption algorithm for image
cryptosystems ”, The Journal of Systems and Software
(58), 2001, pp.83-91.
[9] Aloha Sinha, Kehar Singh, “A technique for image
encryption using digital signature”, Optics
Communications, 2003, vol-218, pp.229-234.
[10] Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-
Wmn Lee, SmJmng Kim, “Multilevel Image Encryption
by Binary Phase XOR Operations”, IEEE Proceeding,
2003, vol.3.
[11] N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption
using chaotic logistic map", Image and Vision
Computing 24, Elsevier, 2006, pp.926-934.
[12] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R.
Tourki, “A Modified AES Based Algorithm for Image
Encryption”, World Academy of Science, Engineering
and Technology, International Journal of Computer,
Information, Systems and Control Engineering, 2007,
vol.01(3), pp.735-740.
[13] Shyong Jian Shyu, “Image encryption by random grids”,
Pattern Recognition 40, 2007, pp.1014-1031.
[14] Mohammad Ali Bani Younes, Aman Jantan, “Image
Encryption Using Block-Based Transformation
Algorithm”, IAENG International Journal of Computer
Science, 2008, vol.35(1).
[15] Mohammad Ali Bani Younes, Aman Jantan, “An Image
Encryption Approach Using a Combination of
Permutation Technique Followed by Encryption”,
IJCSNS International Journal of Computer Science and
Network Security, 2008, vol.8(4), pp.191-197.
[16] Tiegang Gao, Zengqiang Chen, "Image encryption
based on a new total shuffling algorithm", Chaos,
Solitons & Fractals, Elsevier, 2008, vol.38(1), pp.213-
220
[17] A. Mitra, Y. V. Subba Rao, S. R. M. Prasanna, "A New
Image Encryption Approach using Combinational
Permutation Techniques", World Academy of Science,
Engineering and Technology, 2008, vol.2, pp.812-816.
[18] Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zhengjun,
Nie Xuan , Dai Wei-di, “Digital image encryption
algorithm based on chaos and improved DES”, IEEE
International Conference on Systems, Man and
Cybernetics, 2009, pp.474-479.
[19] Valerij Rozouvan, “Modulo image encryption with
fractal keys”, Optics and Lasers in Engineering 47,
2009, pp.1-6.
[20] Ji Won Yoon, Hyoungshick Kim, "An image encryption
scheme with a pseudorandom permutation based on
chaotic maps", Commun Nonlinear Sci Number
Simulat, Elsevier, 15, 2010, pp.3998–4006.
[21] Amitava Nag, Jyoti Prakash Singh, Srabani Khan,
Saswati Ghosh,Sushanta Biswas, D. Sarkar Partha
Pratim Sarkar, “Image Encryption Using Affine
Transform and XOR Operation”, International
Conference on Signal Processing, Communication,
Computing and Networking Technologies (ICSCCN
2011), IEEE, 2011, pp.309-312.
[22] G. A. Sathish Kumar, K. Bhoopathy Bagan, V.
Vivekanand, "A Novel algorithm for image encryption
by integrated pixel scrambling plus diffusion [IISPD]
utilizing duo chaos mapping applicability in wireless
systems", Procedida Computer Science 3, 2011, pp.378-
387
[23] Yan Shen, Guoji Zhang, XCuan Li, Qing Liu, "An
Improved Image Encryption Method Based on Total
Shuffling Scheme", Advances in CSIE, Springer-
Verlag, 2012, vol.2, AISC-169, pp.643-650.
[24] H. T. Panduranga, S. K. Naveen Kumar, "A Novel
Image Encryption Technique using Multi-Wave Based
Carrier Image", International Conference on Modeling
Optimization and Computing (ICMOC), Procedia
Engineering, 2012, vol-38, pp.2998-3004.
[25] Amnesh Goel, Nidhi Chandra, "A Technique for Image
Encryption with Combination of Pixel Rearrangement
Scheme Based on Sorting Group-Wise of RGB Values
and Explosive Inter-Pixel Displacement", International
Journal of Image, Graphics and Signal Processing,
2012, vol.2, pp.16-22.
[26] Qiudong Sun, Wenying Yan, Jiangwei Huang, Wenxin
Ma, “Image Encryption Based on Bit-plane
Decomposition and Random Scrambling”, Journal of
Shanghai Second Polytechnic University, 2012, IEEE,
vol. 09, pp.2630-2633.
[27] Salim M. Wadi, Nasharuddin Zainal, "Rapid
Encryption Method based on AES algorithm for Gray
Scale HD Image Encryption", ICEEI 2013, Procedia
Technology, 2013, vol.11, pp.51-56
[28] P. K. Naskar, A. Chaudhuri, A. Chaudhuri, “A secure
symmetric image encryption based on linear geometry”,
Applications and Innovations in Mobile Computing
(AIMoC), IEEE, 2014, pp.67-74.
[29] Yuanyuan Sun mail, Lina Chen, Rudan Xu, Ruiqing
Kong, "An Image Encryption Algorithm Utilizing Julia
Sets and Hilbert Curves", PLOS ONE, Vol-9, Issue-1,
2014.
[30] P. K. Naskar, A. Chaudhuri, “A Secure Symmetric
Image Encryption Based on Bit-wise Operation”,
International Journal of Image, Graphics and Signal
Processing (IJIGSP), 2014, vol.6(2), pp.30-38.
[31] Nidhal K. EI Abbadi, Adil Mohamad, Mohammed
Abdul-Hameed, "Image Encryption based on Singular
Value Decomposition”, Journal of Computer Science
10(7), 2014, pp.1222-1230.
[32] Ruisong Ye, Shaojun Zeng, Peiqian Lun, Junming Ma,
Chuting Lai, "An Image Encryption Scheme based on
Bit Circular Shift and Bi-directional Diffusion",
International Journal of Information Technology and
Computer Science, 2014, pp.82-92.
[33] Jun-xi Chen, Z-liang Zhu, Zhengjun Liu, Chong Fu, Libo
Zhang, Hi Yu, "A novel double-image encryption
scheme based on cross-image pixel scrambling in gyrator
domains", Optics Express, Optical Society of America,
2014, vol.22(6), pp.7349-7361.