References
- W. Ding and D. Qi, "Digital Image Transformation and Information Hiding and Camouflage Techniques," Chinese Journal of Computers, vol. 21, no. 9, pp. 838-843, 1998.
- V.I. Arnolʹd and A. Avez, Ergodic problems of classical mechanics, Benjamin, 1968.
- W. Ding, W. Yan, and D. Qi, "Digital image scrambling technology based on Arnold transformation," Journal of Computer-Aided Design & Computer Graphics, vol. 13, pp. 339-341, April, 2001.
- C. Li, Z. Han and H. Zhang, "The overview on image encryption Technology," Journal of Computer Research and Development, vol. 39, no.10, pp. 1317-1324, 2002.
- L. Shao, et al., "The overview on image scrambling," Netinfo security, vol. 4, pp. 22-26, 2009.
- L. Wan, X. Sun and X. Lin, "Research on Image Encryption Algorithm Based on Fractal Hilbert Curve Mixed Gray Code," Computer Engineering and Applications, vol. 46, no.34, pp. 184-186, 2010.
- W. Ding, W. Yan, and D. Qi, "Digital Image Scrambling and Digital Watermarking Technology Based on Life Game," Journal of North China University of Technology, vol.1, pp. 1-5, 2000.
- D. Qi, "Research and application on matrix transformation in Image Information Hiding," Journal of North China University of Technology, vol. 1, pp. 24-28, 1999.
- D. Yin, and B. Li, "Using Improved Fibonacci Hash Transform to Increase the Robustness of Meaningful Watermarking Algorithm," Journal of Wuhan Yejin University of Science & Technology, vol. 28, no. 3, pp. 266-269, Mar, 2005.
- Y. Zhao and X. Sun, "An Algorithm for Scrambling Non - Square Images," Microcomputer Information, vol. 27, pp. 99-101+106, 2009.
- Z. Hua, et al., "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, pp. 80-94, 2015. https://doi.org/10.1016/j.ins.2014.11.018
- P. Ping, et al., "An image scrambling algorithm using discrete Henon map," in IEEE International Conference on Information and Automation, 2015.
- T. Kong and D. Zhang, "A new Arnold inverse transform algorithm," Journal of Software, vol. 10, pp. 1558-1564, 2004.
- C. Qin, et al., "A novel image hashing scheme with perceptual robustness using block truncation coding," Information Sciences, vol. 361-362, pp. 84-99, 2016. https://doi.org/10.1016/j.ins.2016.04.036
- Q. Mao, C. Chang and H. Wu, "An Image Encryption Scheme Based on Concatenated Torus Automorphisms," KSII Transactions on Internet and Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013. https://doi.org/10.3837/tiis.2013.06.009
- X. Wang, L. Teng and X. Qin, "A novel colour image encryption algorithm based on chaos," Signal Processing, vol. 92, no. 4, pp. 1101-1108, April, 2012. https://doi.org/10.1016/j.sigpro.2011.10.023
- C. Li, et al., "Breaking a novel colour image encryption algorithm based on chaos," Nonlinear Dynamics, vol. 70, no.4, pp. 2383-2388, 2012. https://doi.org/10.1007/s11071-012-0626-5
- C. Qin, et al., "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
- L. Bao and Y. Zhou, "Image encryption: Generating visually meaningful encrypted images," Information Sciences, vol. 324, pp. 197-207, 2015. https://doi.org/10.1016/j.ins.2015.06.049
- C. Qin and X. Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, 2015. https://doi.org/10.1016/j.jvcir.2015.06.009