References
[1] C. Fu, G.-Y. Zhang, , O. Bian, W.M. Lei,.and H.-F. Ma,.: "A novel medical image protection scheme using a 3-dimensional chaotic system", PloS one, Vol. 9, Issue 12, pp. 123-131, 2014.
[2] C. Cao, K. Sun, and W. Liu,: "A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map", Signal Processing, Vol. 143, Issue 1, pp. 122-133, 2018.
[3] C.T. Yucheng Chen, Y. Ruisong: ?Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion?, Signal Processing, Vol. 167, Issue 1, pp. 107-286, 2019.
[4] G. Mathur,: "A Survey on Medical Image Encryption", International Journal of Computer Sciences and Engineering, Vol, 7, Issue, 4, pp. 44-53, 2019.
[5] Z. Hua, F. Jin, B. Xu, and H. Huang,: "2D Logistic-Sine-coupling map for image encryption", Signal Processing, Vol. 149, Issue 1 pp. 148-161, 2018.
[6] N. Mekki, M. Hamdi, T. Aguili, and Kim, T.-h.: "A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system", In the proceeding 2018 International conference on Advance Communication Technologies and Networking (CommNet) pp. 1-10.
[7] M. Machkour, A. Saaidi, and M.L. Benmaati,: "A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher", 3D Research, Vol. 6, Issue 4 pp. 36-45 2015.
[8] E.A. Adedokun, J.B. Akan, H. Bello-Salau, I.J. Umoh, R.I. Nwosu, and Y. Ibrahim,: "A Secure Chaotic Framework for Medical Image Encryption using a 3D Logistic Map", Applications of Modelling and Simulation, Vol. 4, Issue 2, pp. 141-148, 2020.
[9] C. Fu, Y.-F. Shan, M.-Y. He, Z.-Y. Yu,.and H.-L. Wu,: "A new medical image encryption algorithm using multiple 1-D chaotic maps? In the Proceedings of 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2055-2060, 2018.
[10] K. Panwar, R.K.P.: "Design and Analysis of a Permutation Strategy using 3D Chaotic Map", International Journal of Computer Sciences and Engineering, vol.7 Issue 6, 2019.
[11] W., Zhang, H., Yu, Y.-l., Zhao, and Z.-l. Zhu,: "Image encryption based on three-dimensional bit matrix permutation", Signal Processing, Vol. 118, Issue 1 pp. 36-50, 2016.
[12] L., Xu, Z., Li, J., Li, and W. Hua,: "A novel bit-level image encryption algorithm based on chaotic maps", Optics and Lasers in Engineering, Vol. 78, Issue 1 pp. 17-25, 2016.
[13] M.B., Hossain, M.T., Rahman, A.S., Rahman, and S. Islam,: "A new approach of image encryption using 3D chaotic map to enhance security of multimedia component", In 2014 IEEE, International Conference on Informatics, Electronics & Vision (ICIEV) pp. 1-6.
[14] F., Elgendy, A.M., Sarhan, T.E., Eltobely, S.F., El-Zoghdy, H.S., El-Sayed, and O.S. Faragallah,: "Chaos-based model for encryption and decryption of digital images", Multimedia Tools and Applications, Vol. 75, Issue 18, pp. 11529-11553, 2016.
[15] L., Kocarev, and S. Lian,: "Chaos-based cryptography: Theory, algorithms and applications", Springer Science & Business Media, Vol. 354, pp. 23-36, 2011.
[16] M., Ahmad, M., Doja, and M.S. Beg,: "Security analysis and enhancements of an image cryptosystem based on hyperchaotic system", Journal of King Saud University-Computer and Information Sciences, Vol. Issue, 2018.
[17] F.E.A., El-Samie, H.E.H., Ahmed, I.F., Elashry, M.H., Shahieen, O.S., Faragallah, E.-S.M., El-Rabaie, and S.A Alshebeili,.:"Image encryption: a communication perspective" Vol. 1, (CRC Press, 2013.)
[18] J. Fridrich,: "Symmetric ciphers based on two-dimensional chaotic maps", International Journal of Bifurcation and chaos, Vol. 8, Issue 6, pp. 1259-1284, 1998.
[19] A.V., Diaconu, V., Ionescu, G., Iana, and J.M. Lopez-Guede,: "A new bit-level permutation image encryption algorithm", In 2016 IEEE International Conference on Communications (COMM) pp. 411-416..
[20] N.K. Pareek, V. Patidar, and K.K. Sud,: "Image encryption using chaotic logistic map", Image and vision computing, Vol. 24, Issue 9, pp. 926-934, 2006.
[21] J. Q. Cao, H. R. Xiao, and Z. L., Lan,: "Chaos encryption algorithm based on dual scrambling of pixel position and value", Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications), 2010, Vol. 46, Issue 28, pp. 192-195, 2010.
[22] W. Zhen, H., Xia, L., Yu-Xia, and S. Xiao-Na,: "A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system", Chinese Physics B, Vol. 22, Issue 1, pp. 010504, 2013.
[23] J.-x. Chen, Z.-l. Zhu, C. Fu, and H. Yu,: "An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism", Optics Express, Vol. 21, Issue 23, pp. 27873-27890, 2013.
[24] Y. Zhang, and D. Xiao,: "An image encryption scheme based on rotation matrix bit-level permutation and block diffusion", Communications in Nonlinear Science and Numerical Simulation, Vol. 19, Issue 1, pp. 74-82, 2014.
[25] Y. Li, C. Wang, and H. Chen,: "A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation", Optics and Lasers in Engineering, Vol. 90, Issue 1, pp. 238-246, 2017.
[26] K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik,.: "Secure surveillance framework for IoT systems using probabilistic image encryption", IEEE Transactions on Industrial Informatics, Vol. 14, Issue 8, pp. 3679-3689, 2018.
[27] Z. Hua, and Y. Zhou,: "Image encryption using 2D Logistic-adjusted-Sine map", Information Sciences, Vol. 339, Issue 1, pp. 237-253, 2016.
[28] H. Li, Y. Wang, and Z. Zuo,: "Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms", Optics and Lasers in Engineering, Vol. 115, Issue 1 pp. 197-207, 2019.
[29] C.-J. Xiao and H. Chen ,.: "Adaptive medical image encryption algorithm based on multiple chaotic
mapping", Saudi Journal of Biological Sciences, Vol. 24, Issue 8, pp. 1821?1827, 2017.
[30] Z. Hua, S. Yi, and Y. Zhou,: "Medical image encryption using high-speed scrambling and pixel adaptive diffusion", Signal Processing, Vol. 144, Issue 1, pp. 134-144, 2018.
[31] M. Levoy,: "The stanford volume data archive", 2001?, URL: http://graphics. stanford. edu/data/voldata, 2009.
[32] L. Liu, S. Hao, J. Lin, Z. Wang, X. Hu, and S. Miao,: "Image block encryption algorithm based on chaotic maps", IET Signal Processing, Vol. 12, Issue 1, pp. 22-30, 2017.