[1] | L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently”, in Proceedings of the 4th ACM International Multimedia Conference, pp. 219-230, 1996 |
[2] | H. Cheng, and X. Li, “Partial encryption of compressed images and videos”, IEEE Transactions on Signal Processing, 48, pp. 2439-2451, 2000 |
[3] | J.-C. Yen, and J.-I. Guo, “A new chaotic key-based design for image encryption and decryption”, in Proceedings of 2000 IEEE International Conference on Circuits and Systems, ISACS 2000, 4, pp. 49-52, 2000 |
[4] | B. Bhargava, C. Shi, and S.-Y Wang, 2004, MPEG video encryption algorithms: Multimedia Tools and Applications, Kluwer Academic Publishers, 24(1), 57–79. |
[5] | A. Riaz, and M. Ali, “Chaotic Communications, Their Applications and Advantages over Traditional Methods of Communication”, IEEE Commun. Syst., Networks Digital Signal Process, pp. 21-24, 2008 |
[6] | G.J. Millérioux, M. Amigo, and J. Daafouz, 2008, A Connection between Chaotic and Conventional Cryptography, IEEE Trans. Circuits Syst., 55(6), 1695-1703. |
[7] | L. Kocarev, 2001, Chaos Based Cryptography: A Brief Overview, IEEE Trans. Circuits Syst. Mag., 1(3), 6-21. |
[8] | G. Alvarez, and S. Li, 2006, Some Basic Cryptographic Requirements for Chaos Based Cryptosystems, Int. J. Bifurcation Chaos, 16(8), 2129-2151. |
[9] | T. Yang, C.W. Wu, and L.O. Chua, 1997, Cryptography Based on Chaotic Systems, IEEE Trans. Circuits Syst., 44(5), 469-472. |
[10] | G. Jakimoski, and L. Kocarev, 2001, Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Trans. Circuits Syst., 48(2), 163-169. |
[11] | S. Li, G. Chen, and X. Zheng, Chaos-based encryption for digital images and videos, in B. Furht and D. Kirovski (Eds.), Multimedia Security Handbook, 4 of Internet and Communications Series, Ch. 3, CRC Press, December 2004. |
[12] | T. Xiang, X. Liao, K. Wong, G. Tang, and Y. Chen, “A Novel Block Cryptosystem Based on Iterating a Chaotic Map”, Phys. Lett. A 349, pp. 109-115, 2006 |
[13] | D. Socek, S. Li, S. S. Magliveras, and B. Furht, “Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption”, IEEE Security Privacy for Emerging Areas in Commun Networks, pp. 406-407, 2005 |
[14] | A. Awad, and D. Awad, “Efficient image chaotic encryption algorithm with no propagation error”, ETRI journal 32, pp. 774-783, 2010 |
[15] | P. Fei, S-S. Qiu, and L. Min, “An image encryption algorithm based on mixed chaotic dynamic systems and external keys”, IEEE int conf commun Circuits & systems, pp. 1135-1139, 2005 |
[16] | G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”, Chaos, Solitons and Fractals, 21, pp. 749-761, 2004 |
[17] | Z.H. Guan, F. Huang, and W. Guan, “Chaos-Based Image Encryption Algorithm”, Phys. Lett. A 346, pp. 153-157, 2005 |
[18] | S.G. Lian, J. Sun, Z. Wang, “A block cipher based on a suitable use of chaotic standard map”, Chaos, Solitons and Fractals ,26, pp. 117-29, 2005 |
[19] | D.R. Stinson, Cryptography: theory and practice, CRC Press, second edition, 2002 |
[20] | H. Zhou, A design methodology of chaotic stream ciphers and the realization problems in finite precision, Ph.D. thesis, Department of Electrical Engineering, Fudan University, Shanghai, China, 1996. |
[21] | D. Lu, A. Wang, and X. Tian, “Control and synchronization of a new hyperchaotic system with unknown parameters”, International Journal of Nonlinear Science 6, pp. 224-229, 2008 |