References
- Xingyuan Wang, Hui-li Zhang, Madhuviswanatham, A. V. N. Krishna, A color image encryption with heterogeneous bit -permutation and correlated chaos 2014 Elsevier
- Y. Li, F. Zhang, Y. Li, et al., Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform, Opt. Lasers Eng. 72 (2015)18-25 https://doi.org/10.1016/j.optlaseng.2015.03.027
- J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard J. Springer-Verlag. 2002:55-56 ).
- S. Kartalopoulos, "Security of Information and Communication Networks", Wiley-IEEE Press, (2009).
- Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S Md, A Comprehensive Evaluation of Cryptographic Algorithms: DES,3DES, AES, RSA,Blowfish. ( 2016 ) 617 - 624
- Hongjun Liu, Abdurahman Kadir, Yangling Li, 'Asymmetric color image encryption scheme using 2D discrete-time map (2015)104-112
- KOCAREV L, Lian S, editors. Chaos based cryptography. Springer; 2011
- K. Adinarayana Reddy, B. Vishnuvardhan, Madhuviswanatham, A. V. N. Krishna,'A Modified Hill Cipher Based on Circulant Matrices Procedia Technology Volume 42012Pages 114-118
- Zhang, Q., & Ding, Q. (2015, September). Digital image encryption based on advanced encryption standard (aes). In 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC) (pp. 1218-1221). IEEE.
- Reddy, M. I. S., & Kumar, A. S. (2016, January). Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. In Elsevier, International Conference on Computational Modeling and Security (CMS), Procedia Computer Science (Vol. 85, pp. 62-69).
- Hraoui, S., Gmira, F., Abbou, M. F., Oulidi, A. J., & Jarjar, A. (2019). A new cryptosystem of color image using a dynamic-chaos Hill Cipher algorithm. Procedia computer science, 148, 399-408. https://doi.org/10.1016/j.procs.2019.01.048
- Agung, A., Heryana, N., & Solehudin, A. (2020). Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security. Buana Information Technology and Computer Sciences (BIT and CS), 1(2), 42-45. https://doi.org/10.36805/bit-cs.v1i2.1072
- Essaid, M., Akharraz, I., & Saaidi, A. (2019). Image encryption scheme based on a new secure variant of Hill Cipher and 1D chaotic maps. Journal of Information Security and Applications, 47, 173-187. https://doi.org/10.1016/j.jisa.2019.05.006
- Almaiah, M. A., Dawahdeh, Z., Almomani, O., Alsaaidah, A., Al-khasawneh, A., & Khawatreh, S. (2020). A new hybrid text encryption approach over mobile ad hoc network. International Journal of Electrical and Computer Engineering (IJECE), 10(6), 6461-6471. https://doi.org/10.11591/ijece.v10i6.pp6461-6471
- Das, B. K., & Garg, R. (2019, July). Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 515-520). IEEE.
- N. El-Fishawy and O. Zaid, "Quality of encryption measurementof bitmap images with rc6, mrc6, and rijndael block cipher algorithms," International Journal of Network Security, vol. 5,
- Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75(10), 6663-6682. doi:10.1007/s11227-019-02878-7