Page 21 - 2024-Vol20-Issue2
P. 21
17 | Yousif, Hameed & Al-Zuhairi
Journal of Engineering & Technology, vol. 7, no. 4, [24] X. Chai, X. Zheng, Z. Gan, D. Han, and Y. Chen, “An
pp. 4550–4557, 2018. image encryption algorithm based on chaotic system
and compressive sensing,” Signal Processing, vol. 148,
[15] A. S. Hameed, “High data rate of a novel modulation pp. 124–144, 2018.
scheme based on orthogonal chaotic signals,” Telecom-
munications and Radio Engineering, vol. 75, no. 18, [25] Nasrullah, J. Sang, M. A. Akbar, B. Cai, H. Xiang, and
2016. H. Hu, “Joint image compression and encryption us-
ing iwt with spiht, kd-tree and chaotic maps,” Applied
[16] R. M. Rad, A. Attar, and R. E. Atani, “A new fast and Sciences, vol. 8, no. 10, p. 1963, 2018.
simple image encryption algorithm using scan patterns
and xor,” International Journal of Signal Processing, [26] X. Huang and G. Ye, “An image encryption algorithm
Image Processing and Pattern Recognition, vol. 6, no. 5, based on time-delay and random insertion,” Entropy,
pp. 275–290, 2013. vol. 20, no. 12, p. 974, 2018.
[17] X. Deng, C. Liao, C. Zhu, and Z. Chen, “A novel im- [27] C. Liu and Q. Ding, “A color image encryption scheme
age encryption algorithm based on hyperchaotic system based on a novel 3d chaotic mapping,” Complexity,
and shuffling scheme,” in 2013 IEEE 10th International vol. 2020, pp. 1–20, 2020.
Conference on High Performance Computing and Com-
munications & 2013 IEEE International Conference on [28] J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic
Embedded and Ubiquitous Computing, pp. 109–116, lightweight cryptosystem for image encryption,” Ad-
IEEE, 2013. vances in Multimedia, vol. 2021, pp. 1–16, 2021.
[18] Q. Zhang, L. Guo, and X. Wei, “A novel image fusion [29] T. S. Ali and R. Ali, “A novel color image encryption
encryption algorithm based on dna sequence operation scheme based on a new dynamic compound chaotic map
and hyper-chaotic system,” Optik-International Journal and s-box,” Multimedia Tools and Applications, vol. 81,
for Light and Electron Optics, vol. 124, no. 18, pp. 3596– no. 15, pp. 20585–20609, 2022.
3600, 2013.
[30] X. Gao, M. Miao, and X. Chen, “Multi-image encryption
[19] B. Stoyanov, K. Kordov, et al., “Novel image encryption algorithm for 2d and 3d images based on chaotic system,”
scheme based on chebyshev polynomial and duffing Frontiers in Physics, vol. 10, p. 901800, 2022.
map,” The Scientific World Journal, vol. 2014, 2014.
[31] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure im-
[20] E. A. Naeem, M. M. Abd Elnaby, N. F. Soliman, A. M. age encryption using chaotic, hybrid chaotic and block
Abbas, O. S. Faragallah, N. Semary, M. M. Hadhoud, cipher approach,” Journal of Imaging, vol. 8, no. 6,
S. A. Alshebeili, and F. E. Abd El-Samie, “Efficient im- p. 167, 2022.
plementation of chaotic image encryption in transform
domains,” Journal of Systems and Software, vol. 97, [32] Z. Cheng, W. Wang, Y. Dai, and L. Li, “A high-security
pp. 118–127, 2014. privacy image encryption algorithm based on chaos and
double encryption strategy,” Journal of Applied Mathe-
[21] H. Niu, C. Zhou, B. Wang, X. Zheng, and S. Zhou, matics, vol. 2022, 2022.
“Splicing model and hyper–chaotic system for image
encryption,” Journal of Electrical Engineering, vol. 67, [33] N. A. E.-S. Mohamed, A. Youssif, H. A.-G. El-Sayed,
no. 2, pp. 78–86, 2016. et al., “Fast and robust image encryption scheme based
on quantum logistic map and hyperchaotic system,”
[22] S. Somaraj and M. AliHussain, “An image encryption Complexity, vol. 2022, 2022.
technique using scan based approach and image as key,”
in Proceedings of the First International Conference [34] M. Akraam, T. Rashid, S. Zafar, et al., “A chaos-based
on Computational Intelligence and Informatics: ICCII image encryption scheme is proposed using multiple
2016, pp. 645–653, Springer, 2017. chaotic maps,” Mathematical Problems in Engineering,
vol. 2023, 2023.
[23] X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A [35] H. Gururaj, M. Almeshari, Y. Alzamil, V. Ravi, and
novel image encryption scheme based on dna sequence K. Sudeesh, “Efficient scan and chaotic map encryption
operations and chaotic systems,” Neural Computing and system for securing e-healthcare images,” Information,
Applications, vol. 31, pp. 219–237, 2019. vol. 14, no. 1, p. 47, 2023.