[1] M. Alawida, J.S. Teh and A. Samsudin, An image encryption scheme based on hybridizing digital chaos and finite state machine, Signal Proces. 164 (2019) 249-266.
[2] D.S. Ali, N.A. Alwan and N.M. Al-Saidi, Image encryption based on highly sensitive chaotic system, AIP Conf. Proc. AIP Publishing, LLC. 2183(1) (2019) 080007.
[3] N. M. Al-Saidi, MG. Nadia, S. S. Al-Bundi and J. N. Al-Jawari, A hybrid of fractal image coding and fractal dimension for an efficient retrieval method, Comput. Appl. Math. 37(2) (2018) 996–1011.
[4] N.M. Al-Saidi and A.H. Ali, Towards enhancing of fractal image compression performance via block complexity, Ann. Conf. New Trends Inf. Commun. Technol. Appl. IEEE (2017) 246–251.
[5] N. M. Al-Saidi, M. R. M. Said and W. A. M. Othman, Password authentication based on fractal coding scheme, Journal of Applied Mathematics, 2012 (2012).
[6] N.A. Alwan, A.Y. Yousif and N.M. Al-Saidi, Performance-enhancing of RSA public key via three-dimensional hyperchaotic system, AIP Conf. Proc. 2325(1) (2021) 020027.
[7] A.M. Asl, A. Broumandnia and S.J. Mirabedini, Scale invariant digital color image encryption using a 3D modular chaotic map, IEEE Access 9 (2021) 102433–102449.
[8] M. S¸ahin A¸cikkapi, F. Ozkaynak and A. Bedri Ozer, Side-channel analysis of chaos-based substitution box structures, IEEE Access 7 (2019) 79030–79043.
[9] C. Cao, K. Sun and W. Liu, A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map, Signal Proces. 143 (2018) 122–133.
[10] H. Diab and A.M. El-Semary, Secure image cryptosystem with unique key streams via hyper-chaotic system, Signal Proces. 142 (2018) 53–68.
[11] A.K. Farhan, N.M.G. Al-Saidi, A.T. Maolood, F. Nazarimehr and I. Hussain, Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder, Entropy 21(10) (2019) 958.
[12] S. Heron, Advanced encryption standard (AES), Network Security 2009(12) (2009) 8–12.
[13] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.S. Koo and S. Chee, HIGHT: A new block cipher suitable for low-resource device, In International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, (2006) 46-59.
[14] Z. Hua and Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map, Inf. Sci. (Ny) 339 (2016) 237–253.
[15] Z. Hua, Y. Zhou, C.M. Pun and C.P. Chen, 2D Sine Logistic modulation map for image encryption, Inf. Sci. (Ny) 297 (2015) 80–94.
[16] Z. Hua, F. Jin, B. Xu and H. Huang, 2D logistic-sine-coupling map for image encryption, Signal Proces. 149 (2018)148–161.
[17] M. Khan and F. Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps, Multimedia Tools Appl. 78(18) (2019) 26203–26222.
[18] L.R. Knudsen, Practically secure Feistel ciphers, Int. Workshop on Fast Software Encryption, Springer, (1993) 211–221.
[19] S. Koppu and V.M. Viswanatham, A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform, Model. Simul. Eng. 2017 (2017) Article ID 7470204.
[20] W. Liu, K. Sun and C. Zhu, A fast image encryption algorithm based on chaotic map, Optics Lasers Engin. 84 (2016) 26–36.
[21] H. Liu and X. Wang, Color image encryption based on one-time keys and robust chaotic maps, Comput. Math. Appl. 59(10) (2010) 3320–3327.
[22] E.N. Lorenz, Deterministic nonperiodic flow, J. Atmospheric Sci. 20(2) (1963) 130–141.
[23] G. Maddodi, A. Awad, D. Awad, M. Awad and B. Lee, A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding, Multimed. Tools Appl. 77(19) (2018) 24701–24725.
[24] G. Makris and I. Antoniou, Cryptography with chaos, Proc. 5th Chaotic Model. Simul. Int. Conf. Athens, Greece, (2012) 12–15.
[25] A. Nag, J. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P. Sarkar, Image encryption using affine transform and XOR operation, Int. Conf. Signal Proces. Commun. Comput. Network. Technol. (2011) 309–312.
[26] H. Natiq, M.R.M. Said, N.M. Al-Saidi and A. Kilicman, Dynamics and complexity of a new 4d chaotic laser system, Entropy 21(1) (2019) 34.
[27] H. Natiq, N.M. Al-Saidi and M.R.M. Said, Complexity and dynamic characteristics of a new discrete-time hyperchaotic model, Second Al-Sadiq Int. Conf. Multidiscip. IT Commun. Sci. Appl. (2017) 1–6.
[28] H. Natiq, N.M.G. Al-Saidi, M.R.M. Said and A. Kilicman, A new hyperchaotic map and its application for image encryption, Eur. Phys. J. Plus, 133(1) (2018) 6.
[29] H. Poincare, Science et Methode, Flammarion, Paris, 1908.
[30] A. Rukhin, J. Soto, J. Nechvatal, M. Smid and E. Barker, S.D. Leigh, M. Levenson, M. Vangel, D.L. Banks, N.A. Heckert, J.F. Dray Jr. and S.C. Vo, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Pub Series, 2021.
[31] C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Technical J. 28(4) (1994) 656–715.
[32] Standard, Data Encryption and others, Federal information processing standards publication 46, National Bureau of Standards, US Department of Commerce 23 (1977).
[33] M. T. Wazi, D. S. Ali, N. M. Al-Saidi and N. A. Alawn, A secure image cryptosystem via multiple chaotic maps, Discrete Math Algorithms Appl. 2021 (2021) 2150141.
[34] X. Wu, D. Wang, J. Kurths and H. Kan, A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system, Inf. Sci. (Ny). 349-350 (2016) 137–153.
[35] Y. Wu, J. P. Noonan and S. Agaian, NPCR and UACI randomness tests for image encryption, J. Selected Areas Telecommun. 1(2) (2011) 31–38.
[36] L. Xu, X. Gou, Z. Li and J. Li, A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion, Optics Lasers Engin. 91 (2017) 41–52.
[37] W. Yan, Z. Jiang, X. Huang and Q. Ding, A Three-Dimensional Infinite Collapse Map with Image Encryption, Entropy 23(9) (2021) 1221.
[38] L. Yi, X. Tong, Z. Wang, M. Zhang, H. Zhu and J. Liu, A novel block encryption algorithm based on chaotic S-box for wireless sensor network, IEEE Access 7 (2019) 53079–53090.
[39] D. Younus, N.M. Al-Saidi and W.K. Hamoudi, Secure optical communication based on new 2D-hyperchaotic map, AIP Conf. Proc. AIP Publishing LLC. 2183(1) (2019) 090006.
[40] Y. Zhang, L. Zhang, J. Zhou, L. Liu, F. Chen and X. He, A review of compressive sensing in information security field, IEEE Access 4 (2016) 2507–2519.