References
[1]. Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new
encryption algorithm for image cryptosystems. Journal of
Systems and Software, 58(2), 83-91. https://doi.org/10.101
6/S0164-1212(01)00029-2
[2]. Yen, J. C., & Guo, J. I. (2000). A new chaotic mirror-like
image encryption algorithm and its VLSI architecture.
Pattern Recognition and Image Analysis (Advances in
Mathematical Theory and Applications), 10(2), 236-247.
[3]. Indrakanti, S. P., & Avadhani, P. S. (2011). Permutationbased
image encryption technique. International Journal
of Computer Applications, 28(8), 45-47.
[4]. Kester, Q. A. (2013). A cryptographic Image Encryption
technique based on the RGB Pixel shuffling. International
Journal of Advanced Research in Computer Engineering
& Technology, 2(2), 848-854.
[5]. Megashree, B. S., & Sujatha, B. R. (2018). AES based
image encryption and decryption using Matlab,
International Journal of Engineering Research &
Technology (IJERT), 6(13), 1-3.
[6]. Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., & Sarkar, D. S. P. (2011). Image encryption using affine
transform and XOR operation. In 2011, International
Conference on Signal Processing, Communication,
Computing and Networking Technologies (pp. 309-312).
IEEE.
[7]. Shin, C., Seo, D., Chol, K., Lee, H., & Kim, S. (2003).
Multilevel Image encoding by Binary part XOR Operations.
IEEE.
[8]. Sinha, A., & Singh, K. (2003). A technique for image
encryption using digital signature. Optics Communications,
218(4-6), 229-234. https://doi.org/10.1016/S0030-4018
(03)01261-6
[9]. Sun, Q., Yan, W., Huang, J., & Ma, W. (2012, April).
Image encryption based on bit-plane decomposition and
random scrambling. In 2012, 2nd International Conference
on Consumer Electronics, Communications and Networks
(CECNet) (pp. 2630-2633). IEEE. https://doi.org/
10.1109/CECNet.2012.6201673
[10]. Sun, Y., & Wang, G. (2011, October). An image
encryption scheme based on the modified logistic map. In
2011, Fourth International Workshop on Chaos-Fractals
Theories and Applications (pp. 179-182). IEEE.
https://doi.org/10.1109/IWCFTA.2011.56
[11]. Younes, M. A. B., & Jantan, A. (2008). An image
encryption approach using a combination of permutation
techniques followed by encryption. IJCSNS International
Journal of Computer Science and Network Security, 8(4),
191-197.
[12]. Bani, M. A., & Jantan, A. (2008). Image encryption
using block-based transformation algorithm. IJCSNS
International Journal of Computer Science and Network Security, 8(4), 191-197.
[13]. Zhou, Y., & Agaian, S. (2011, June). Image encryption
using the image steganography concept and PLIP model.
In Proceedings 2011 International Conference on System
Science and Engineering (pp. 699-703). IEEE.
https://doi.org/10.1109/ICSSE.2011.5961993