M. Alawida, J.S. Teh and A. Samsudin, An image encryption scheme based on hybridizing digital chaos and finite
state machine, Signal Proces. 164 (2019) 249-266.
 D.S. Ali, N.A. Alwan and N.M. Al-Saidi, Image encryption based on highly sensitive chaotic system, AIP Conf.
Proc. AIP Publishing, LLC. 2183(1) (2019) 080007.
 N. M. Al-Saidi, MG. Nadia, S. S. Al-Bundi and J. N. Al-Jawari, A hybrid of fractal image coding and fractal
dimension for an efficient retrieval method, Comput. Appl. Math. 37(2) (2018) 996–1011.
 N.M. Al-Saidi and A.H. Ali, Towards enhancing of fractal image compression performance via block complexity,
Ann. Conf. New Trends Inf. Commun. Technol. Appl. IEEE (2017) 246–251.
 N. M. Al-Saidi, M. R. M. Said and W. A. M. Othman, Password authentication based on fractal coding scheme,
Journal of Applied Mathematics, 2012 (2012).
 N.A. Alwan, A.Y. Yousif and N.M. Al-Saidi, Performance-enhancing of RSA public key via three-dimensional
hyperchaotic system, AIP Conf. Proc. 2325(1) (2021) 020027.
 A.M. Asl, A. Broumandnia and S.J. Mirabedini, Scale invariant digital color image encryption using a 3D modular
chaotic map, IEEE Access 9 (2021) 102433–102449.
 M. S¸ahin A¸cikkapi, F. Ozkaynak and A. Bedri ¨ Ozer ¨ Side-channel analysis of chaos-based substitution box structures, IEEE Access 7 (2019) 79030–79043.
 C. Cao, K. Sun and W. Liu, A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map,
Signal Proces. 143 (2018) 122–133.
 H. Diab and A.M. El-Semary, Secure image cryptosystem with unique key streams via hyper-chaotic system, Signal
Proces. 142 (2018) 53–68.
 A.K. Farhan, N.M.G. Al-Saidi, A.T. Maolood, F. Nazarimehr and I. Hussain, Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder, Entropy 21(10) (2019) 958.
 S. Heron, Advanced encryption standard (AES), Network Security 2009(12) (2009) 8–12.
 D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.S. Koo and S. Chee, HIGHT: A new block cipher suitable for
low-resource device, In International Workshop on Cryptographic Hardware and Embedded Systems, Springer,
Berlin, Heidelberg, (2006) 46-59.
 Z. Hua and Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map, Inf. Sci. (Ny) 339 (2016) 237–253.
 Z. Hua, Y. Zhou, C.M. Pun and C.P. Chen, 2D Sine Logistic modulation map for image encryption, Inf. Sci. (Ny)
297 (2015) 80–94.
 Z. Hua,F. Jin, B. Xu and H. Huang, 2D logistic-sine-coupling map for image encryption, Signal Proces. 149 (2018)
 M. Khan and F. Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps,
Multimedia Tools Appl. 78(18) (2019) 26203–26222.
 L.R. Knudsen, Practically secure Feistel ciphers, Int. Workshop on Fast Software Encryption, Springer, (1993)
 S. Koppu and V.M. Viswanatham, A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic
magic transform, Model. Simul. Eng. 2017 (2017) Article ID 7470204.
 W. Liu, K. Sun and C. Zhu, A fast image encryption algorithm based on chaotic map, Optics Lasers Engin. 84
 H. Liu and X. Wang, Color image encryption based on one-time keys and robust chaotic maps, Comput. Math.
Appl. 59(10) (2010) 3320–3327.
 E.N. Lorenz, Deterministic nonperiodic flow, J. Atmospheric Sci. 20(2) (1963) 130–141.
 G. Maddodi, A. Awad, D. Awad, M. Awad and B. Lee, A new image encryption algorithm based on heterogeneous
chaotic neural network generator and dna encoding, Multimed. Tools Appl. 77(19) (2018) 24701–24725.
 G. Makris and I. Antoniou,Cryptography with chaos, Proc. 5th Chaotic Model. Simul. Int. Conf. Athens, Greece,
 A. Nag, J. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P. Sarkar, Image encryption using affine
transform and XOR operation, Int. Conf. Signal Proces. Commun. Comput. Network. Technol. (2011) 309–312. H. Natiq, M.R.M. Said, N.M. Al-Saidi and A. Kilicman, Dynamics and complexity of a new 4d chaotic laser
system, Entropy 21(1) (2019) 34.
 H. Natiq, N.M. Al-Saidi and M.R.M. Said, Complexity and dynamic characteristics of a new discrete-time hyperchaotic model, Second Al-Sadiq Int. Conf. Multidiscip. IT Commun. Sci. Appl. (2017) 1–6.
 H. Natiq, N.M.G. Al-Saidi, M.R.M. Said and A. Kilicman, A new hyperchaotic map and its application for image
encryption, Eur. Phys. J. Plus, 133(1) (2018) 6.
 H. Poincare, Science et Methode, Flammarion, Paris, 1908.
 A. Rukhin, J. Soto, J. Nechvatal, M. Smid and E. Barker, S.D. Leigh, M. Levenson, M. Vangel, D.L. Banks, N.A.
Heckert, J.F. Dray Jr. and S.C. Vo, A Statistical Test Suite for Random and Pseudorandom Number Generators
for Cryptographic Applications, NIST Pub Series, 2021.
 C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Technical J. 28(4) (1994) 656–715.
 Standard, Data Encryption and others, Federal information processing standards publication 46, National Bureau
of Standards, US Department of Commerce 23 (1977).
 M. T. Wazi,D. S. Ali,N. M. Al-Saidi and N. A. Alawn, A secure image cryptosystem via multiple chaotic maps,
Discrete Math Algorithms Appl. 2021 (2021) 2150141.
 X. Wu, D. Wang, J. Kurths and H. Kan, A novel lossless color image encryption scheme using 2D DWT and 6D
hyperchaotic system, Inf. Sci. (Ny). 349-350 (2016) 137–153.
 Y. Wu,J. P. Noonan and S. Agaian, NPCR and UACI randomness tests for image encryption, J. Selected Areas
Telecommun. 1(2) (2011) 31–38.
 L. Xu, X. Gou, Z. Li and J. Li, A novel chaotic image encryption algorithm using block scrambling and dynamic
index based diffusion, Optics Lasers Engin. 91 (2017) 41–52.
 W. Yan, Z. Jiang, X. Huang and Q. Ding, A Three-Dimensional Infinite Collapse Map with Image Encryption,
Entropy 23(9) (2021) 1221.
 L. Yi, X. Tong, Z. Wang, M. Zhang, H. Zhu and J. Liu, A novel block encryption algorithm based on chaotic
S-box for wireless sensor network, IEEE Access 7 (2019) 53079–53090.
 D. Younus, N.M. Al-Saidi and W.K. Hamoudi, Secure optical communication based on new 2D-hyperchaotic map,
AIP Conf. Proc. AIP Publishing LLC. 2183(1) (2019) 090006.
 Y. Zhang, L. Zhang, J. Zhou, L. Liu, F. Chen and X. He, A review of compressive sensing in information security
field, IEEE Access 4 (2016) 2507–2519.