[1. Stallings, W. Cryptography and Network Security. 5th Edition. Pearson Publishers, Prentice Hall, 2011.]Search in Google Scholar
[2. Salama, D., A, Minaam, H., M. Abdual-Kader, M. Mohamed Hadhou d. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. - International Journal of Network Security, Vol. 2, 2010, No 2, pp. 78-87.]Search in Google Scholar
[3. Gong-Bin, Q., J. Qing-Feng, Q. Shui-Sheng. A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit. - In: Proc. of IEEE International Workshop on Imaging Systems and Techniques, 2009, pp. 168-172.]Search in Google Scholar
[4. Ling, B., L. Lichen, Z. Jan. Image Encryption Algorithm Based on Chaotic Map and S-DES. - Advanced Computer Control (ICACC), IEEE, Vol. 5, 2010, pp 41-44.10.1109/ICACC.2010.5486998]Search in Google Scholar
[5. Kaufman, C., R. Perlman, M. Speciner. Network Security: Private Communication in aPublic World. Upper Saddle River, NJ, US, Prentice Hall Press, 2002. ]Search in Google Scholar
[6. Nie, T., T. Zhang. A Study of DESand Blowfish Encryption Algorithm. - In: Proc. of TENCONIEEE Region 10 Conference, 2009, pp. 1-4.10.1109/TENCON.2009.5396115]Search in Google Scholar
[7. Xiao, H., Q. Shuisheng, D. Chengliang. A Composite Image Encryption Scheme Using AESand Chaotic Series. - In: Proc. of 1st ISDPE, IEEE, 2007, pp. 277-279.]Search in Google Scholar
[8. Msolli, A., A. Helali, H. Maaref. Image Encryption with the AES Algorithm in Wireless Sensor Network. - In: Proc. of 2nd International Conference on Advanced Technologies for Signal and Image Processing, IEEE, 2016, pp. 41-45.10.1109/ATSIP.2016.7523055]Search in Google Scholar
[9. Schneier, B. Description ofa New Variable-Length Key, 64-Bit Block Cipher (Blowfish). - In: Proc. of International Workshop on FSE, Springer, Vol. 809, 1994, pp. 191-204.10.1007/3-540-58108-1_24]Search in Google Scholar
[10. Aurora, T., P. Arora. Blowfish Algorithm. - IJCSCE, Vol. 2, NCRAET-2013, Special Issue, pp. 238-243. ]Search in Google Scholar
[11. Ali, M., B. Younes, A. Jantan. Image Encryption Using Block-Based Transformation Algorithm. - IAENG International Journal of Computer Science, Vol. 35, 2008, No 1, pp. 407-415.]Search in Google Scholar
[12. Rise, R. E., S.-H. Cho, D. Kaylor. RC4 Encryption. 2008. https://www.math.washington.edu/~nichifor/310_2008_Spring/Pres_RC4%20Encryption.pdf]Search in Google Scholar
[13. Stošić, L., M. Bogdanović. RC4 Stream Cipher and Possible Attacks on WEP. - IJACSA, Vol. 3, 2012, No 3, pp. 110-114.10.14569/IJACSA.2012.030319]Search in Google Scholar
[14. Mousa, A., A. Hamad. Evaluation of the RC4 Algorithm for Data Encryption. - International Journal of Computer Science and Application, Vol. 3, 2006, No 2, pp. 44-56.]Search in Google Scholar
[15. Ginting, R. U., R. Y. Dillak. Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map. - ICITEE, IEEE, 2013, pp. 101-105.10.1109/ICITEED.2013.6676220]Search in Google Scholar
[16. Sasidharan, S., D. S. Philip. A Fast Partial Image Encryption Scheme with Wavelet Transform and RC4. - International Journal of Advances in Engineering & Technology, Vol. 1, 2011, No 4, pp. 322-331.]Search in Google Scholar
[17. Riad, A. M., A. H. Hussein, H. M. Kasem, A. A. El-Azm. A New Efficient Image Encryption Technique Based on Arnold and IDEA Algorithms. - ICIIP, Vol. 46, 2012, pp. 140-145.]Search in Google Scholar
[18. Singh, H. P., S. Verma, S. Mishr. Secure-International Data Encryption Algorithm. - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, 2013, No 2, pp. 780-792.]Search in Google Scholar
[19. Worthington, B. An Introduction to Hill Ciphers Using Linear Algebra. University of North Texas, 2010, pp 1-24.]Search in Google Scholar
[20. Bibhudendra, A., S. K. Panigrahy, S. K. Patra, G. Panda. Image Encryption Using Advanced Hill Cipher Algorithm. - IJRTER, Vol. 1, 2009, No 1 pp. 663-667.]Search in Google Scholar
[21. Mishra, D. C., R. K. Sharma. Grayscale-Image Encryption Using Random Hill Cipher over SLn(F) Associated with Discrete Wavelet Transformation. - AAM: An International Journal, Vol. 8, 2013, No 2, pp. 777-791.]Search in Google Scholar
[22. Yang, C., M. Hua, S. Jia. Image Encryption Algorithm Based on Chaotic Mapping and Chinese Remainder Theorem. - Metallurgical and Mining Industry, 2015, No 4, pp. 206-212.]Search in Google Scholar
[23. Kong, L., L. Li. A New Image Encryption Algorithm Based on Chaos. - In: Proc. of 35th Chinese Control Conference, IEEE, 2016, pp. 4932-4937.10.1109/ChiCC.2016.7554120]Search in Google Scholar
[24. Chen, T., M. Zhang, J. Wu, C. Yuen, Y. Tong. Image Encryption and Compression Based on Kronecker Compressed Sensing and Elementary Cellular Automata Scrambling. - Optics & Laser Technology, Elsevier, Vol. 84, 2016, pp. 118-133.10.1016/j.optlastec.2016.05.012]Search in Google Scholar
[25. Hua, Z., Y. Zhou. Image Encryption Using 2D Logistic-Adjusted-Sine Map. - Information Sciences, Elsevier, Vol. 339, 2016, pp. 237-253.10.1016/j.ins.2016.01.017]Search in Google Scholar
[26. Tang, Z., J. Song, X. Zhang, R. Sun. Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps. - Optics and Lasers in Engineering, Elsevier, Vol. 80, 2016, pp. 1-11.10.1016/j.optlaseng.2015.12.004]Search in Google Scholar
[27. Ye, G. Image Scrambling Encryption Algorithm of Pixel Bit Based on Chaos Map. - Pattern Recognition Letters, Elsevier, Vol. 31, 2010, pp. 347-354.10.1016/j.patrec.2009.11.008]Open DOISearch in Google Scholar
[28. Abdul, N., M. Abbas. Image Encryption Based on Independent Component Analysis and Arnold’s Cat Map. - Egyptian Informatics Journal, Elsevier, Vol. 17, 2015, pp. 139-146.10.1016/j.eij.2015.10.001]Search in Google Scholar
[29. Lin, Z.-H., H.-X. Wang. Image Encryption Based on Chaos with PWL Memristor in Chua’s Circuit. - ICCCAS, IEEE, 2009, pp. 964-968.]Search in Google Scholar
[30. Zhang, H., R. Cai. Image Encryption Algorithm Based on Bit-Plane Scrambling and Multiple Chaotic Systems Combination. - ICISS, IEEE, 2010, pp. 113-117.]Search in Google Scholar
[31. Tang, Z., X. Zhang, W. Lan. Efficient Image Encryption with Block Shuffling and Chaotic Map. - Multimed Tools Appl., Springer, Vol. 74, 2014, No 15, pp. 5429-5448.10.1007/s11042-014-1861-1]Search in Google Scholar
[32. Zhang, Y. P., P. Xu, L. Z. Xiang. Research of Image Encryption Algorithm Based on Chaotic Magic Square. - Advances in ECWAC, Springer, Vol. 2, 2012, pp. 103-109.10.1007/978-3-642-28658-2_16]Search in Google Scholar
[33. Wang, D., C.-C. Chang, Y. Liu, G. Song, Y. Liu. Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values. - International Journal of Network Security, Vol. 17, 2015, No 3, pp. 322-327.]Search in Google Scholar
[34. Milanov, E. The RSA Algorithm. 3 June 2009. https://www.math.washington.edu/~morrow/336_09/papers/Yevgeny.pdf]Search in Google Scholar
[35. Vinothini, Saranya, Vasumath i. A Study on RSA Algorithm for Cryptography. - IJCSIT, Vol. 5, 2014, pp. 5708-5709.]Search in Google Scholar
[36. Anandakumar, S. Image Cryptography Using RSA Algorithm in Network Security. - IJCSET, Vol. 5, 2015, No 9, pp. 326-330.]Search in Google Scholar
[37. Chandel, G. S., P. Patel. A Review: Image Encryption with RSAand RGB Randomized Histograms. - IJARCCE, Vol. 2, 2013, No 11, pp. 4391-4401.]Search in Google Scholar
[38. Oswald, E. Introduction to Elliptic Curve Cryptography. 2005. http://www.vanilla47.com/PDFs/Cryptography/Miscellenea/Introduction_to_Elliptic_Curve_Cryptography.pdf]Search in Google Scholar
[39. Mohamed, A., S. Eldeen, Abdellatif, A. Elkouny, S. Elraml y. DES Algorithm Security Fortification Using Elliptic Curve Cryptography. - ICCES, IEEE, 2015, pp. 335-340.10.1109/ICCES.2015.7393071]Search in Google Scholar
[40. Suganya, N., S. Sathiy a. Encryption of Image Matrix Using Elliptic Curve Cryptography. - IJITE, Vol. 2, 2012, pp. 229-232.]Search in Google Scholar
[41. Shuangyuan, Y., L. Zhengding, H. Shuihu a. An Asymmetric Image Encryption Based on Matrix Transformation. - ISCIT, IEEE, Vol. 1, 2004, pp. 66-69.]Search in Google Scholar
[42. Kester, Q.-A., L. Nana, A. C. Paseu. A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm for Securing Digital Images. - In: Proc. of International Conference on AST, IEEE, 2013, pp. 1-5.10.1109/ICASTech.2013.6707497]Search in Google Scholar
[43. Sasi, S., D. L. Swarna Jyothi. A Heuristic Approach for Secured Transmission of Image Based on Bernstein Polynomial. - In: Proc. of International Conference on Circuits, Communication, Control and Computing, IEEE, 2013, pp. 312-315.10.1109/CIMCA.2014.7057813]Search in Google Scholar
[44. Chhotaray, S. K., A. Chhotaray, G. Sankar Rath. A New Method of Generating Public Key Matrix and Using It for Image Encryption. - In: Proc. of 2nd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2015, pp. 453-458.10.1109/SPIN.2015.7095272]Search in Google Scholar
[45. Elashry, I., O. Allah, A. Abbas, S. El-Rabaie, F. El-Samie. Homomorphic Image Encryption. - Journal of Electronic Imaging, Vol. 18, 2009, No 3, pp. 1-14.10.1117/1.3167847]Search in Google Scholar
[46. El-Fishawy, N., O. Zaid. Quality of Encryption Measurement of Bitmap Images with Rc6, Mrc6, and Rijndael Block Cipher Algorithms. - International Journal of Network Security, Vol. 5, 2007, No. 3, pp. 241-251.]Search in Google Scholar
[47. Kamali, S., R. Shakerian, M. Hedayati, M. Rahman i. A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption. - In: Proc. of International Conference on Electronics and Information Engineering, IEEE, Vol. 1, 2010, pp. 1-141.10.1109/ICEIE.2010.5559902]Search in Google Scholar
[48. Ahmad, J., F. Ahmed. Efficiency Analysis and Security Evaluation of Image Encryption Schemes. - International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS, Vol. 12, 2012, No 4, pp. 18-31.]Search in Google Scholar
[49. Shannon, C. Communication Theory of Secrecy Systems. - Bell System Technical Journal, Vol. 28, 1949, No 4, pp. 656-715. 10.1002/j.1538-7305.1949.tb00928.x]Search in Google Scholar
[50. Lian, S. Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, CRC Press, Taylor and Francis Group. 2008.10.1201/9781420065282]Search in Google Scholar
[51. Elkamchouchi, H., M. Makar. Measuring Encryption Quality for Bitmap Images Encrypted with Rijndael and Kamkar Block Ciphers. - In: Proc. of 22nd IEEE National, Radio Science Conference (NRSC’05), 2005, pp. 277-284.10.1109/NRSC.2005.194011]Search in Google Scholar
[52. Ahmed, H., H. Kalash, O. Allah. Encryption Efficiency Analysis and Security Evaluation of Rc6 Block Cipher for Digital Images. - In: Proc. of International Conference on Electrical Engineering, IEEE, 2007, pp. 1-7.10.1109/ICEE.2007.4287293]Search in Google Scholar
[53. El-lskan darani, M., S. Darwish, S. Abugub a. A Robust and Secure Scheme for Image Transmission over Wireless Channels. - In: Proc. of 42nd Annual International Conference on CST, IEEE, 2008, pp. 51-55.10.1109/CCST.2008.4751276]Search in Google Scholar
[54. Ranjan, K. H. S., H. R. P. Kumar, K. B. Sudeepa, G. Aithal. Enhanced Security System Using Visual Cryptograhy and Symmetric Encryption. - International Journal of Advances in Engineering & Technology (IJAET), Vol. 6, 2013, No 3, pp. 1211-1219.]Search in Google Scholar
[55. Naor, M., A. Shamir. Visual Cryptography. - Proceedings of Advances in Cryptology, EUROCRYPT 94, Springer-Verlag, LNCS, Vol. 950, 1994, pp. 1-12.10.1007/BFb0053419]Search in Google Scholar
[56. Prabir, K. Naskar, Ayan Chaudhuri, Debarati Basu, Atal Chaudhur i. A Novel Image Secret Sharing Scheme. - In: Proc. of 2nd International Conference on Emerging Applications of Information Technology, IEEE, 2011, pp. 177-180.]Search in Google Scholar
[57. Sharma, H., N. Kumar, G. K. Jha. Enhancement of Security in Visual Cryptography System Using Cover Image Share Embedded Security Algorithm (CISEA). - In: Proc. of International Conference on Computer & Communication Technology (ICCCT’11), IEEE, 2011, pp. 462-467.10.1109/ICCCT.2011.6075137]Search in Google Scholar
[58. Kafri, O., E. Keren. Encryption of Pictures and Shapes by Random Grids. - Optics Letters, Vol. 12, 1987, pp. 377-379.10.1364/OL.12.000377]Open DOISearch in Google Scholar
[59. Hawkes, L. W., A. Yasinsac, C. Cline. An Application of Visual Cryptography to Financial Documents. Technical Report, Florida State University, 2000.]Search in Google Scholar
[60. Li, M.-J., J. S.-T. Juan. A Flexible Multiple-Secret Image Sharing Scheme by Shifting Random Grids. - In: Proc. of 17th International Symposium on Consumer Electronics (ISCE’13), IEEE, 2013, pp. 289-290.10.1109/ISCE.2013.6570232]Search in Google Scholar
[61. Joy, J., Y. Chang, S. Justice, T. Juan. Multi VSS Scheme by Shifting Random Grids. - World Academy of Science, Engineering and Technology, Vol. 67, 2012, pp. 936-942.]Search in Google Scholar
[62. Jothi, R., A. Ojha. On Multi-Secret Sharing Using Hill Cipher and Random Grids. - In: Proc. of International Conference on Advances in Computer Engineering and Applications (ICACEA’15), IEEE, 2015, pp. 683-687.10.1109/ICACEA.2015.7164778]Search in Google Scholar
[63. Chen, W.-K. Image Sharing Method for Gray-Level Images. - Journal of Systems and Software, Vol. 86, 2013, pp. 581-585.10.1016/j.jss.2012.09.040]Open DOISearch in Google Scholar
[64. Sruthy, K., J. R. Ramesh. Random Grid Based Visual Cryptography Usinga Common Share. - In: Proc. of International Conference on Computing and Network Communications (Co Co Net’15), IEEE, 2015, pp. 656-662.]Search in Google Scholar
[65. Liu, F., C. Wu. Embedded Extended Visual Cryptography Schemes. - IEEE Transactions on Information Forensics and Security, Vol. 6, 2011, No 2, pp. 307-322.10.1109/TIFS.2011.2116782]Open DOISearch in Google Scholar
[66. Askari, N., H. M. Heys, C. R. Molone y. An Extended Visual Cryptography Scheme without Pixel Expansion for Halftone Images. - In: Proc. of 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering, 2013, pp. 1-6.10.1109/CCECE.2013.6567726]Search in Google Scholar
[67. Kang, I., R. Gonzalo, Arce, H.-K. Lee. Color Extended Visual Cryptography Using Error Diffusion. - ICASSP, IEEE, 2009, pp. 1473-1476.]Search in Google Scholar