[1]SHANNON C E. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4):656-715.
[2]MATTHEWS R. On the derivation of a "chaotic" encryption algorithm [J]. Cryptologia, 1984, 8(1):29-41.
[3]FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps [J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.
[4]ZHANG G, LIU Q. A novel image encryption method based on total shuffling scheme [J]. Optics Communications, 2011, 284(12): 2775-2780.
[5]KHANZADI H, ESHGHI M, BORUJENI S E. Image encryption using random bit sequence based on chaotic maps [J]. Arabian Journal for Science and Engineering, 2013, 39(2):1039-1047.
[6]WANG X, TENG L, QIN X. A novel colour image encryption algorithm based on chaos [J]. Signal Processing, 2012, 92(4):1101-1108.
[7]XIE T, HE X. A new color image encryption scheme based on chaos [J]. Application Research of Computers, 2013, 30(1): 318-320. (谢涛,何兴. 一种新的基于混沌的彩色图像加密方案[J].计算机应用研究,2013,30(1):318-320.)
[8]WANG J. Image encryption algorithm based on improved ergodic matrix and pixel value diffusion [J]. Journal of Computer Applications, 2012, 32(6):1646-1649,1653. (王继军. 基于改进遍历矩阵和像素值扩散的通用图像加密算法[J]. 计算机应用, 2012, 32(6): 1646-1649, 1653.)
[9]ZHANG L, HU X, LIU Y, et al.A chaotic image encryption scheme owning temp-value feedback [J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(10): 3653-3659.
[10]WANG J, JIANG G. Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version [J]. Acta Physica Sinica, 2011, 60(6): 83-93. (王静, 蒋国平. 一种超混沌图像加密算法的安全性分析及其改进[J]. 物理学报,2011,60(6):83-93).
[11]SUN F, LYU Z. Digital image encryption with chaotic map lattices [J]. Chinese Physics B, 2011, 20(4): 040506.
[12]LI C, ZHANG L, OU R, et al.Breaking a novel colour image encryption algorithm based on chaos [J]. Nonlinear Dynamics, 2012, 70(4): 2383-2388.
[13]LI C, ARROYO D, LO K-T. Breaking a chaotic cryptographic scheme based on composition maps [J]. International Journal of Bifurcation and Chaos, 2010, 20(8): 2561-2568.
[14]WANG X, HE G. Cryptanalysis on a novel image encryption method based on total shuffling scheme [J]. Optics Communications, 2011, 284(24): 5804-5807.
[15]ZHANG L, LI C, SHU S, et al.Cryptanalyzing a chaos-based image encryption algorithm using alternate structure [J]. Journal of Systems and Software, 2012, 85(9): 2077-2085.
[16]HUANG F, GUAN Z. Cryptosystem using chaotic keys [J]. Chaos, Solitons & Fractals, 2005, 23(3): 851-855.
[17]LI C, CHEN G. On the security of a class of image encryption schemes [C]// ISCAS 2008: Proceedings of the 2008 IEEE International Symposium on Circuits and Systems. Piscataway: IEEE, 2008: 3290-3293.
[18]LI S, LI C, CHEN G, et al.A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J]. Signal Processing: Image Communication, 2008, 23(3): 212-223. |