[1] | E B William, (2000), Data Encryption Standard, in NIST's anthology, A Century of Excellence in Measurements Standards and Technology: A Chronicle of Selected NBS/NIST Publications. |
[2] | FIPS PUB 197, (2001), Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce. |
[3] | C.E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, vol. 28, No. 4, pp. 656-715, October 1949. |
[4] | Li, T.Y., Yorke, J.A. Period three implies chaos. The American Mathematical Monthly 82, 985{992 (1975). |
[5] | Matthews, R. Cryptologia 1989, XIII, 29–42. |
[6] | Habutsu, T.; Nishio, Y.; Sasase, I.; Mori, S., Advancesincryptology-Eurocrypt’91, Lecture notes in computers cience 0547, Pp.127-140, Spinger-Verlag, Berlin, 1991. |
[7] | Fridrich, J. Int. J. Bifurcation and Chaos 1998, 8, 1259–1284. |
[8] | Baptista, M. S. Phys. Lett. A 1998, 240, 50–54. |
[9] | Alexander N. Pisarchik, Massimiliano Zanin, Chaotic map cryptography and security In: Encryption: Methods, Software and Security Editor: Editor Name, pp. 1-28, 2010 Nova Science Publishers, Inc. |
[10] | Kelber, K.; Schwarz, W. NOLTA 2005, Bruges. |
[11] | http://math.arizona.edu/~urareports/041/Headington.Kenny/Final_Report/quadraticmap.pdf |
[12] | S Li, (2007), Analyses and new designs of digital chaotic ciphers, Ph.D. dissertation, information and communications engineering, Xi’an Jiaotong Univeristy, China. |
[13] | M. T. Rosenstein, J. J. Collins, and C. J. de Luca, (1993), A practical method for calculating largest Lyapunov exponents from small data sets, Physical D: Nonlinear Phenomena, vol. 65, no. 1-2, pp.117–134. |
[14] | Z. Liu, Q. Guo, L. Xu, M.A. Ahmad, S. Liu, (2010) Double image encryption by using iterative random binary, Optics Communications 275 (2), 324-329. |
[15] | Z-L. Zhu, W. Zhang, K-W Wong, H. Yu, (2011), A chaos-based symmetric image encryption scheme using bit-level permutation, Information Sciences 181 1171-1186. |
[16] | C. Li, S. Li, K.-T. Lo, (2011), Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation 16 (2) 837-843. |
[17] | K. Gupta, S. Silakari, (2011), New approach for fast color image encryption using chaotic map, Journal of Information Security 2 139-150. |
[18] | Fernando Jorge S. Moreira, (1992), Chaotic dynamics of quadratic maps, Master’s thesis, University of Porto. |
[19] | V. Lynnyk, (2010), Chaos-Based Communication Systems. Ph.D. thesis, Czech Technical University, Faculty of Electrical Engineering Department of Control Engineering, Prague. |
[20] | M. T. Rosenstein, J. J. Collins, and C. J. de Luca, (1993), A practical method for calculating largest Lyapunov exponents from small data sets, Physica D: Nonlinear Phenomena, 65, (1-2) 117–134. |
[21] | H. Kantz, (1994), A robust method to estimate the maximal Lyapunov exponent of a time series, Physics Letters A, 185, (1) 77–87. |
[22] | Geisel, T., Fairen, V., (1984), Statistical properties of chaos in Chebyshev maps, Phys. Lett. A, 105, (6) 263–266. |
[23] | R Noha, HA HossamEldin, EE Said, and EA Fathi, (2015), Hybrid ciphering system of image based on fractional Fourier transform and two chaotic maps , International Journal of Computer Applications (0975 – 8887), 119 (11) 12–17. |
[24] | J. Fridrich, Symmetric Ciphers Based on Two-Dimensional Chaotic Maps, Int. J. Bifurcation and Chaos, Vol. 8, No. 6, pp. 1259–1284, 1998. |
[25] | http://in.mathworks.com/help/images/ref/corr2.html |
[26] | C Kevin, B Karen, (2003), An evaluation of image based steganography methods, International Journal of Digital Evidence, volume no. 2, Issue 2. |
[27] | Chong Fu, Junjie Chen, Hao Zou, Weihong Meng, Yongfeng Zhan, and Yawe, (2012), A chaos based digital image encryption scheme with an improved diffusion strategy, Optics Express, volume no. 20. |
[28] | Y. Wang, K-W. Wong, X. Liao, G. Chen, (2011), A new chaos-based fast image encryption algorithm, Applied Soft Computing 11 (1) 514-522. |