[1] BHATNAGAR G, WU Q M J, RAMAN B. A new fractional random wavelet transform for fingerprint security[J]. IEEE Transactions on Systems, Man, and Cybernetics-Part A:Systems and Humans, 2011, 42(1):262-275. [2] ZHOU Y, PANETTA K, AGAIAN S, et al. Image encryption using P-Fibonacci transform and decomposition[J]. Optics Communications, 2012, 285(5):594-608. [3] ZHOU Y, PANETTA K, AGAIAN S, et al. (n,k,p)-Gray code for image systems[J]. IEEE Transactions on Cybernetics, 2013, 43(2):515-529. [4] CHEN T H, WU C S. Compression-unimpaired batch-image encryption combining vector quantization and index compression[J]. Information Sciences, 2010, 180(9):1690-1701. [5] WANG X Y, DUAN C F. A new chaotic encryption algorithm based on ergodicity[J]. Chinese Journal of Computational Physics, 2006, 23(5):621-625. [6] XU S J, WANG J Z, YANG S X. Cryptography based on chaos with delayed feedback loop[J]. Chinese Journal of Computational Physics, 2008, 25(6):749-756. [7] HUA Z, ZHOU Y, PUN C M, et al. 2D Sine Logistic modulation map for image encryption[J]. Information Sciences, 2015, 297:80-94. [8] 石航, 王丽丹. 一种基于压缩感知和多维混沌系统的多过程图像加密方案[J]. 物理学报, 2019, 68(20):200501. [9] ZHANG Q, ZHANG H, LI Z. One-way hash function construction based on conservative chaotic systems[C].2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009, 2:402-405. [10] HOOVER W G. Remark on "Some simple chaotic flows"[J]. Physical Review E, 1995, 51(1):759. [11] SPROTT J C. Some simple chaotic flows[J]. Physical Review E, 1994, 50(2):R647-R650. [12] CANG S, LI Y, KANG Z, et al. Generating multicluster conservative chaotic flows from a generalized Sprott-A system[J]. Chaos, Solitons & Fractals, 2020, 133:109651. [13] DONG E, YUAN M, DU S, et al. A new class of Hamiltonian conservative chaotic systems with multistability and design of pseudo-random number generator[J]. Applied Mathematical Modelling, 2019, 73:40-71. [14] QI G. Modelings and mechanism analysis underlying both the 4D Euler equations and Hamiltonian conservative chaotic systems[J]. Nonlinear Dynamics, 2019, 95(3):2063-2077. [15] WANG X, ZHANG H. A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications, 2015, 342:51-60. [16] LIU H, WANG X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system[J]. Optics Communications, 2011, 284(16-17):3895-3903. [17] ZHANG W, YU H, ZHAO Y, et al. Image encryption based on three-dimensional bit matrix permutation[J]. Signal Processing, 2016, 118:36-50. [18] PAK C, HUANG L. A new color image encryption using combination of the 1D chaotic map[J]. Signal Processing, 2017, 138:129-137. [19] LI Y, WANG C, CHEN H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Optics and Lasers in Engineering, 2017, 90:238-246. [20] LIU H, WANG X. Color image encryption based on one-time keys and robust chaotic maps[J]. Computers & Mathematics with Applications, 2010, 59(10):3320-3327. [21] XUE W, ZHANG Y C. Application of conservative hyperchaos in digital image encryption[J]. Chinese Journal of Computational Physics, 2020, 37(4):497-504. [22] DONG C. Asymmetric color image encryption scheme using discrete-time map and hash value[J]. Optik, 2015, 126(20):2571-2575. [23] AMELLAL H, MESLOUHI A, EL ALLATI A. Secure big data using QKD protocols[J]. Procedia Computer Science, 2019, 148:21-29. [24] SEYEDZADE S M, MIRZAKUCHAKI S, ATANI R E. A novel image encryption algorithm based on Hash function[C].20106th Iranian Conference on Machine Vision and Image Processing. IEEE, 2010:1-6. [25] GLABB R, IMBERT L, JULLIEN G, et al. Multi-mode operator for SHA-2 Hash functions[J]. Journal of Systems Architecture, 2007, 53(2-3):127-138. [26] BENNETT C H, BRASSARD G. Quantum cryptography:Public key distribution and coin tossing[J]. Theoretical Computer Science, 2014, 560:7-11. [27] RUKHIN A, SOTO J, NECHVATAL J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[R]. Booz-Allen and Hamilton incMclean VA, 2001. [28] QI G, CHEN G, DU S, et al. Analysis of a new chaotic system[J]. Physica A:Statistical Mechanics and its Applications, 2005, 352(2-4):295-308. [29] LORENZ E N. Deterministic nonperiodic flow[J]. Journal of the Atmospheric Sciences, 1963, 20(2):130-141. [30] SU Z, LIAN S, ZHANG G, JIANG J. Chaos-based video encryption algorithms[M]//KOCAREV L, LIAN S. Chaos-based cryptography. Springer, Berlin, Heidelberg, 2011:205-226. [31] BENSIKADDOUR E H, BENTOUTOU Y, TALEB N. Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher[J]. Journal of King Saud University-Computer and Information Sciences, 2020, 32(1):50-56. [32] SINGH S, MANDORIA H L. A review on image encryption technique and to extract feature from image[J]. International Journal of Computer Applications, 2017, 163(1):19-23. |