References
[1]. Awad, A., & Awad, D. (2010). Efficient image chaotic
encryption algorithm with no propagation error. ETRI
Journal, 32(5), 774-783. https://doi.org/10.4218/etrij.10.
1510.0063
[2]. Chirkkarottu, S., & Mathew, S. (2013). Summarization
on DNA cr yptography. International Journal of
Engineering Research & Technology (IJERT), 2(11), 303-
306.
[3]. Enayatifar, R., Abdullah, A. H., & Lee, M. (2013). A
weighted discrete imperialist competitive algorithm
(WDICA) combined with chaotic map for image
encryption. Optics and Lasers in Engineering, 51(9), 1066-
1077. https://doi.org/10.1016/j.optlaseng.2013.03.010
[4]. Kadir, A., Hamdulla, A., & Guo, W. Q. (2014). Color
image encryption using skew tent map and hyper
th chaotic system of 6 -order CNN. Optik, 125(5), 1671-
1675. https://doi.org/10.1016/j.ijleo.2013.09.040
[5]. Kanso, A., & Ghebleh, M. (2012). A novel image
encryption algorithm based on a 3D chaotic map.
Communications in Nonlinear Science and Numerical
Simulation, 17(7), 2943-2959. https://doi.org/10.1016/j.c
nsns.2011.11.030
[6]. Kaundal, A. K., & Verma, A. K. (2014). DNA based
cryptography: A review. International Journal of
Information and Computation Technology, 4(7), 693-
698.
[7]. Li, H., Huang, Q., Shen, J., Yang, G., & Susilo, W.
(2019). Designated-server identity-based authenticated
encryption with keyword search for encrypted emails.
Information Sciences, 481, 330-343. https://doi.org/10.
1016/j.ins.2019.01.004
[8]. Lu, Y., Wang, G., Li, J., & Shen, J. (2017). Efficient
designated server identity-based encryption with
conjunctive keyword search. Annals of Telecommunications,
72(5-6), 359-370. https://doi.org/10.1007/s12243-017-05
74-7
[9]. Mazloom, S., & Eftekhari-Moghadam, A. M. (2009).
Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons & Fractals, 42(3), 1745-
1754. https://doi.org/10.1016/j.chaos.2009.03.084
[10]. Noroozi, M., Karoubi, I., & Eslami, Z. (2018).
Designing a secure designated server identity-based
encryption with keyword search scheme: Still unsolved.
Annals of Telecommunications, 73(11-12), 769-776.
https://doi.org/10.1007/s12243-018-0653-4
[11]. Sidorenko, A. V., & Shishko, M. S. (2016). Encryption
of Image using DNA-sequences, chaotic dinamics and
hash functions. Doklady BGUIR (in Russian). 5, 42-47.
[12]. Wang, Q., Zhang, Q., & Zhou, C. (2009, October). A
multilevel image encryption algorithm based on chaos
and DNA coding. In 2009, Fourth International Conference
on Bio-Inspired Computing (BICTA), (pp. 1-5). IEEE.
https://doi.org/10.1109/BICTA.2009.5338154
[13]. Wang, X. F., Mu, Y., Chen, R., & Zhang, X. S. (2016).
Secure channel free id-based searchable encryption for
peer-to-peer group. Journal of Computer Science and
Technology, 31(5), 1012-1027. https://doi.org/10.1007/s
11390-016-1676-9
[14]. Yin, C. (2019). Encoding DNA sequences by integer
chaos game representation. Journal of Computational
Biology, 26(2), 143-151. https://doi.org/10.1089/cmb.20
18.0173
[15]. Zhang, X., Shao, L., Zhao, Z., & Liang, Z. (2014). An
image encryption scheme based on constructing large
permutation with chaotic sequence. Computers &
Electrical Engineering, 40(3), 931-941. https://doi.org/10.
1016/j.compeleceng.2013.08.008