References
[1]. Li Chang-Gang, Han Zheng-Zhi, and Zhang Hao-
Ran, "Image Encryption Techniques: A Survey", Journal of Computer Research and Development, Vol. 39, No. 10, pp. 1317-1324, Oct. 2002.
[2]. Wei Ding, Wei-qi Yan, and Dong-xu Qi, "A Novel Digital Hiding Technology Based on Tangram Encryption", IEEE Proceedings of on NEWCAS 2005, and
"Conways Game", Proceeding of 2000 International Conference on Image Processing, Vol. 1, pp. 601 -604, Sept. 2000.
[3]. Zhao Xue-feng, "Digital Image Scrambling Based on the Baker's Transformation", Journal of Northwest Normal University (Natural Science), Vol. 39, No. 2,
pp. 26-29, Feb. 2003.
[4]. Bao Guan-jun, Ji Shi-ming, and Shen Jian-bin, "Magic Cube Transformation and Its Application in Digital Image Encryption", Computer Applications, Vol. 22, No. 11, pp. 23-25, Nov. 2002.
[5]. Zhu Guibin, Cao Changxiu, Hu Zhongyu, et al., "An Image Scrambling and Encryption Algorithm Based on Affine Transformation", Journal of Computer-Aided Design & Computer Graphics, Vol. 15, No. 6, pp. 711 -715, June 2003.
[6]. Jiri Fridrich, "Image Encryption Based on Chaotic Maps", Proceelng of IEEE Conference on Systems, Man, and Cybernetics, pp. 1105-1110,1997.
[7]. Jui-Cheng Yen, and Jiun-ln Guo, "A New Chaotic Key- Based Design for Image Encryption and Decryption", IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000.
[8]. M.I.Sobhy and A.R.Shehata, "Chaotic Algorithms for Data Encryption", IEEE Proceeding of ICASSP 2001, Vol .2, pp. 997-1000, May 2001.
[9]. Mazleena Sallen, Subariah Ibrahim, and Ismail Fauzi Isnin, "Enhanced Chaotic Image Encryption Algorithm Based on Vaker's Map", IEEE Proceedings of ISCAS 2003, Vol. 2, pp. 11-508-11-511, May 2003.
[10]. Shaojiang Deng, Linhua Zhang, and Di Xiao, "Image Encryption Scheme Based on Chaotic Neural System", J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872,2005.
[11 ]. WangYing, Zheng DeLing, Ju Lei etal., "TheSpatial- Domain Encryption of Digital Images Based on High- Dimension Chaotic System", Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December, 2004.
[12]. M.I.Sobhy and A.R.Shehata, "Methods of Attacking Chaotic Encryption and Countermeasures", IEEE Proceeding of ICASSP 2001, Vol. 2, pp. 1001-1004, May 2001.
[13]. Jiun-ln Guo, Jui-Cheng Yen, "A new mirror-like image encryption algorithm and its VLSI architecture". Department of Electronics Engineering, National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
[14]. Tony Warnock. "Random-Number Generators" Los Alamos Science Special issue, 1987.
[15]. ligoroski, Markovski and Knapskog, * A Fix of the MD4 Family of Hash Functions - Quasigroup Fold '.NIST Cryptographic Hash Workshop 31 Oct.-l Nov. 2005.
[16]. Dimitrova and J. Markovski, "On Quasigroup Pseudo Random Sequence Generators", Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University, Arhimedova 5, PO Box 162, 1000Skopje, Macedonia.
[17]. Smile Markovski Danilo Gligoroski", Differential cryptanalysis of the quasigroup cipher". University of Kuopio, Finland, SS Cyril and Methodius University, Republic of Macedonia.
[18]. Smile Markovski Danilo Gligoroski," Construction of quasi groups of huge order", Ss Cyril and Methodius University Skopje, Macedonia, ICDMA7 June 17-20, Bansko, Bulgaria.
[19]. Monisha Sharma, Manisha Sharma, and Swagota Bera," On Quasi Pseudo Random Sequence Generator", I.E.I (Rajastan State Center) 22nd National Conference, 4-5 August 2006.
[20]. Dr. Navin Rajpal, Anil Kumar, Sureka Dudhani and Pravesh Raja Jindal, "Copyright protection using non¬linear forward feedback shift register and error-correction technique" \n Map India Conference, 2002.
[21]. S.Moni and R.L. Kashyap, "Image communication over a distributed multimedia system".
[22]. J.H. Holland. "Adaptation in natural and artificial systems", MIT press 1975,
[23]. David Beasley, David R. Bull and Ralph R. Martin "An Overview of Genetic Algorithms: Part 1 Fundamentals" University computing 1993,15(2)58-69.
[24]. Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr, and Gary B. Lamont, " Novel Steganography Detection using an Artificial Immune System".
[25]. Melanie Mitchell, * An Introduction to Genetic Algorithm", MIT Press, 1996.
[26]. N. Chaiyaratana and A.M.S. Zalzala, "Recent Developments in Evolutionary and Genetic Algorithm: Theory and Applications" IEEE Conference Publication, No:446, Sept. 2-4,1997.
[27]. Monisha Sharma and Manisha Sharma, "An Evolutionary algorithm in security based software Engineering", International conference In Wireless Communication and Sensor Network in IIIT-Allahabad with IEEE.
[28]. Tariq Jamil and Afaq Ahmed "An investigation into the application of linear feedback shift register for steganography" in IEEE proceedings South East Conference, 2002.
[29]. Anderson, R.J. and Petitcolas, F.A.R, "On the limits of steganography", IEEE Journal of Selected areas In Communications, Special issue on Encrypted Image using on the limits of Steganography, Vol. 16,Mayl990.
[30]. F.A.R Petitcolas and R.J. Anderson and M.G. Kuhn, "Information Hiding A Survey," Proc IEEE. Vol. 87,1999.
[31 ]. Monisha Sharma and Manisha Sharma ," An Novel data system using genetic algorithm". International conference in computer design in Las Vegas , Nevada USA on June 26-29,2006.
[32]. N. Kobiltz 1987, Elliptic curve cryptosystems, Mathematics of computations: 203-209.