Page 21 - 2024-Vol20-Issue2
P. 21

17 |                                                              Yousif, Hameed & Al-Zuhairi

      Journal of Engineering & Technology, vol. 7, no. 4,         [24] X. Chai, X. Zheng, Z. Gan, D. Han, and Y. Chen, “An
      pp. 4550–4557, 2018.                                              image encryption algorithm based on chaotic system
                                                                        and compressive sensing,” Signal Processing, vol. 148,
[15] A. S. Hameed, “High data rate of a novel modulation                pp. 124–144, 2018.
      scheme based on orthogonal chaotic signals,” Telecom-
      munications and Radio Engineering, vol. 75, no. 18,         [25] Nasrullah, J. Sang, M. A. Akbar, B. Cai, H. Xiang, and
      2016.                                                             H. Hu, “Joint image compression and encryption us-
                                                                        ing iwt with spiht, kd-tree and chaotic maps,” Applied
[16] R. M. Rad, A. Attar, and R. E. Atani, “A new fast and              Sciences, vol. 8, no. 10, p. 1963, 2018.
      simple image encryption algorithm using scan patterns
      and xor,” International Journal of Signal Processing,       [26] X. Huang and G. Ye, “An image encryption algorithm
      Image Processing and Pattern Recognition, vol. 6, no. 5,          based on time-delay and random insertion,” Entropy,
      pp. 275–290, 2013.                                                vol. 20, no. 12, p. 974, 2018.

[17] X. Deng, C. Liao, C. Zhu, and Z. Chen, “A novel im-          [27] C. Liu and Q. Ding, “A color image encryption scheme
      age encryption algorithm based on hyperchaotic system             based on a novel 3d chaotic mapping,” Complexity,
      and shuffling scheme,” in 2013 IEEE 10th International            vol. 2020, pp. 1–20, 2020.
      Conference on High Performance Computing and Com-
      munications & 2013 IEEE International Conference on         [28] J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic
      Embedded and Ubiquitous Computing, pp. 109–116,                   lightweight cryptosystem for image encryption,” Ad-
      IEEE, 2013.                                                       vances in Multimedia, vol. 2021, pp. 1–16, 2021.

[18] Q. Zhang, L. Guo, and X. Wei, “A novel image fusion          [29] T. S. Ali and R. Ali, “A novel color image encryption
      encryption algorithm based on dna sequence operation              scheme based on a new dynamic compound chaotic map
      and hyper-chaotic system,” Optik-International Journal            and s-box,” Multimedia Tools and Applications, vol. 81,
      for Light and Electron Optics, vol. 124, no. 18, pp. 3596–        no. 15, pp. 20585–20609, 2022.
      3600, 2013.
                                                                  [30] X. Gao, M. Miao, and X. Chen, “Multi-image encryption
[19] B. Stoyanov, K. Kordov, et al., “Novel image encryption            algorithm for 2d and 3d images based on chaotic system,”
      scheme based on chebyshev polynomial and duffing                  Frontiers in Physics, vol. 10, p. 901800, 2022.
      map,” The Scientific World Journal, vol. 2014, 2014.
                                                                  [31] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure im-
[20] E. A. Naeem, M. M. Abd Elnaby, N. F. Soliman, A. M.                age encryption using chaotic, hybrid chaotic and block
      Abbas, O. S. Faragallah, N. Semary, M. M. Hadhoud,                cipher approach,” Journal of Imaging, vol. 8, no. 6,
      S. A. Alshebeili, and F. E. Abd El-Samie, “Efficient im-          p. 167, 2022.
      plementation of chaotic image encryption in transform
      domains,” Journal of Systems and Software, vol. 97,         [32] Z. Cheng, W. Wang, Y. Dai, and L. Li, “A high-security
      pp. 118–127, 2014.                                                privacy image encryption algorithm based on chaos and
                                                                        double encryption strategy,” Journal of Applied Mathe-
[21] H. Niu, C. Zhou, B. Wang, X. Zheng, and S. Zhou,                   matics, vol. 2022, 2022.
      “Splicing model and hyper–chaotic system for image
      encryption,” Journal of Electrical Engineering, vol. 67,    [33] N. A. E.-S. Mohamed, A. Youssif, H. A.-G. El-Sayed,
      no. 2, pp. 78–86, 2016.                                           et al., “Fast and robust image encryption scheme based
                                                                        on quantum logistic map and hyperchaotic system,”
[22] S. Somaraj and M. AliHussain, “An image encryption                 Complexity, vol. 2022, 2022.
      technique using scan based approach and image as key,”
      in Proceedings of the First International Conference        [34] M. Akraam, T. Rashid, S. Zafar, et al., “A chaos-based
      on Computational Intelligence and Informatics: ICCII              image encryption scheme is proposed using multiple
      2016, pp. 645–653, Springer, 2017.                                chaotic maps,” Mathematical Problems in Engineering,
                                                                        vol. 2023, 2023.

[23] X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A            [35] H. Gururaj, M. Almeshari, Y. Alzamil, V. Ravi, and
      novel image encryption scheme based on dna sequence               K. Sudeesh, “Efficient scan and chaotic map encryption
      operations and chaotic systems,” Neural Computing and             system for securing e-healthcare images,” Information,
      Applications, vol. 31, pp. 219–237, 2019.                         vol. 14, no. 1, p. 47, 2023.
   16   17   18   19   20   21   22   23   24   25   26