[1] M.Z. Abdullah and Z.J. Khaleefah, Design and implement of a hybrid cryptography textual system, Int. Conf.
Engin. Technol. (ICET), 2017, pp. 1–6.
[2] M.A. Al-Khasawneh, I. Uddin, S.A.A. Shah, A.M. Khasawneh, L. Abualigah and M. Mahmoud, An improved
chaotic image encryption algorithm using hadoop-based mapreduce framework for massive remote sensed images
in parallel iot applications, Cluster Comput. 25 (2022), no. 2, 999–1013.
[3] X. Bai, L. Zhang, J. Li, Z. Yu, Z. Yang, Y. Wang, X. Chen and X. Zhou, Coherent imaging of objects through
thin-layer highly scattering medium based on optical encryption, Optics Commun. 506 (2022), 127558.
[4] E. Balamurugan, L.R. Flaih, D. Yuvaraj, K. Sangeetha, A. Jayanthiladevi and T.S. Kumar, Use case of artificial
intelligence in machine learning manufacturing 4.0, Int. Conf. Comput. Intell. Knowledge Econ. (ICCIKE), 2019,
pp. 656–659.
[5] M. Budiman, A neural cryptography approach for digital image security using vigenere cipher and tree parity
machine, J. Phys.: Conf. Ser. 1898 (2021), 012039.
[6] J. Choi and N. Y. Yu, Secure image encryption based on compressed sensing and scrambling for internet-ofmultimedia things, IEEE Access 10 (2022), 10706–10718.
[7] V. Dahiphale, G. Bansod, and J. Patil, Anu-ii: A fast and efficient lightweight encryption design for security in
iot, Int. Conf. Big Data, IoT and Data Sci. (BID), 2017, pp. 130–137.
[8] K. Dharavathu and S.A. Mosa. Efficient transmission of an encrypted image through a mimo–ofdm system with
different encryption schemes, Sens. Imag. 21 (2020), no. 1, 1–31.
[9] R. Durga, E. Poovammal, K. Ramana, R.H. Jhanveri, S. Singh and B. Yoon. Ces blocks-a novel chaotic encryption
schemes based blockchain system for an iot environment, IEEE Access 10 (2022), 11354–11371.
[10] M. Farah, A. Farah and T. Farah, An image encryption scheme based on a new hybrid chaotic map and optimized
substitution box, Nonlinear Dyn. 99 (2020), no. 4, 3041–3064.
[11] V. Gaur, R.K. Gujral, A. Mehta, N. Gupta and R. Bansal, Enhanced digital image encryption using sine transformed complex chaotic sequence, Proc. Int. Conf. Artific. Intell. Appl., 2021, pp. 149–160.
[12] A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, Image encryption method based on improved ecc and modified
aes algorithm, Multimedia Tools Appl. 80 (2021), no. 13, 19769–19801.
[13] M. Hashim, M.S. Taha, A.H.M. Aman, A.H.A. Hashim, M.S.M. Rahim and S. Islam, Securing medical data
transmission systems based on integrating algorithm of encryption and steganography, 7th Int. Conf. Mechatronics
Engin. (ICOM), 2019, pp. 1–6.
[14] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in
fingerprints based steganography, Proc. 3rd Int. Symp. Comput. Sci. Intell. Control, 2019, pp. 1–8.
[15] Z. Hu and S. Kais, A quantum encryption design featuring confusion, diffusion, and mode of operation, arXiv
preprint arXiv:2010.03062, (2020).[16] Z. Hua, Y. Zhou and H. Huang, Cosine-transform-based chaotic system for image encryption, Inf. Sci. 480 (2019),
403–419.
[17] S.T. Kamal, K.M. Hosny, T.M. Elgindy, M.M. Darwish and M.M. Fouda, A new image encryption algorithm for
grey and color medical images, IEEE Access 9 (2021), 37855–37865.
[18] J. Khan, J. P. Li, B. Ahamad, S. Parveen, A.U. Haq, G.A. Khan and A.K. Sangaiah, Smsh: Secure surveillance
mechanism on smart healthcare iot system with probabilistic image encryption, IEEE Access 8 (2020), 15747–
15767.
[19] P.R. Krishna, C.V.S. Teja and V. Thanikaiselvan, A chaos based image encryption using Tinkerbell map functions,
Second Int. Conf. Electron. Commun. Aerospace Technol. (ICECA), 2018, pp. 578–582.
[20] K.S. Kumar, G. Sreenivasulu and S. V. Rajan, Block based svd approach for additive white gaussian noise level
estimation in satellite images, 3rd Int. Conf. Comput. Sustain. Glob. Dev. (INDIACom), 2016, pp. 1464–1468.
[21] T. M. Kumar, K.S. Reddy, S. Rinaldi, B.D. Parameshachari and K. Arunachalam, A low area high speed fpga
implementation of aes architecture for cryptography application, Electron. 10 (2021), no. 16, 2023.
[22] V. Kumar and A. Girdhar, A 2d logistic map and lorenz-rossler chaotic system based rgb image encryption
approach, Multimedia Tools Appl. 80 (2021), no. 3, 3749–3773.
[23] B. Li, Y. Feng, Z. Xiong, W. Yang and G. Liu. Research on ai security enhanced encryption algorithm of autonomous iot systems, Inf. Sci. 575 (2021), 379–398.
[24] W. Li, X. Chang, A. Yan and H. Zhang, Asymmetric multiple image elliptic curve cryptography, Optics Lasers
Engin. 136 (2021), 106319.
[25] C.-H. Lin, G.-H. Hu, C.-Y. Chan and J.-J. Yan, Chaos-based synchronized dynamic keys and their application to
image encryption with an improved aes algorithm, Appl. Sci. 11 (2021), no. 3, 1329.
[26] A.A. Maryoosh, Z.S. Dhaif and R.A. Mustafa, Image confusion and diffusion based on multi-chaotic system and
mix-column, Bull. Electric. Engin. Inf. 10 (2021), no. 4, 2100–2109.
[27] M.M. Matalgah and A.M. Magableh, Simple encryption algorithm with improved performance in wireless communications, IEEE Radio Wireless Symp., 2011, pp. 215–218.
[28] A.N. Mazher and J. Waleed, Implementation of modified gso based magic cube keys generation in cryptography,
Eastern-Eur. J. Enterprise Technol. 1 (2021), no. 9, 43–49.
[29] S. Medileh, A. Laouid, R. Euler, A. Bounceur, M. Hammoudeh, M. AlShaikh, A. Eleyan and O.A. Khashan, A
flexible encryption technique for the internet of things environment, Ad Hoc Networks 106 (2020), 102240.
[30] G. Ming, Eagle: A new symmetric encryption algorithm against any linear attacks and differential attacks (the
existence of one-way function means p!= np), preprint.
[31] P. Mohanakrishnan, K. Suthendran, S. Arumugam and T. Panneerselvam. Mixed noise elimination and data
hiding for secure data transmission, Int. Conf. Theor. Comput. Sci. Discrete Math. 2016, pp. 156–164.
[32] A. S. Muhammad and F. Ozkaynak, ¨ Siea: secure image encryption algorithm based on chaotic systems optimization algorithms and pufs, Symmetry 13 (2021), no. 5, 824.
[33] K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik, Secure surveillance framework for iot
systems using probabilistic image encryption, IEEE Trans. Ind. Inf. 14 (2018), no. 8, 3679–3689.
[34] R. Munir. A block-based image encryption algorithm in frequency domain using chaotic permutation, 8th Int.
Conf. Telecommun. Syst. Serv. Appl.(TSSA), 2014, pp. 1-5.
[35] P.S.K. Oberko, V.-H.K.S. Obeng, and H. Xiong, A survey on multi-authority and decentralized attribute-based
encryption, J. Ambient Intell. Humanized Comput. 13 (2022), no. 1, 515–533
[36] A. Ouannas, A.-A. Khennaoui, S. Bendoukha, T.P. Vo, V.-T. Pham and V.V. Huynh, The fractional form of the
tinkerbell map is chaotic, Appl. Sci. 8 (2018), no. 12, 2640.
[37] A. G. Radwan, On some generalized discrete logistic maps, J. Adv. Res. 4 (2013), no. 2, 163–171.
[38] A. Sahasrabuddhe and D.S. Laiphrakpam, Multiple images encryption based on 3d scrambling and hyper-chaoticsystem, Inf. Sci. 550 (2021), 252–267.
[39] R. Senkerik, M. Pluhacek, I. Zelinka and Z.K. Oplatkova, Utilization of the discrete chaotic systems as the pseudo
random number generators, Modern Trends Tech. Comput. Sci., Springer, Cham, 2014, pp. 155–164.
[40] A.A. Shah, S.A. Parah, M. Rashid and M. Elhoseny, Efficient image encryption scheme based on generalized
logistic map for real time image processing, J. Real-Time Image Process. 17 (2020), no. 6, 2139–2151.
[41] M.H. Shukur, Design a mobile medication dispenser based on iot technology, 3rd Int. Conf. Commun. Engin.
Comput. Sci. (CIC-COCOS19), 2019.
[42] M.S. Taha, M.S.M. Rahim, S.A. Lafta, M.M. Hashim and H.M. Alzuabidi, Combination of steganography and
cryptography: A short survey, IOP Conf. Series: Mater. Sci. Engin. 518 (2019), 052003.
[43] M.S.H. Talpur, M.Z.A. Bhuiyan and G. Wang. Shared–node iot network architecture with ubiquitous homomorphic
encryption for healthcare monitoring, Int. J. Embed. Syst. 7 (2015), no. 1, 43–54.
[44] A. Toktas, U. Erkan and D. Ustun. An image encryption scheme based on an optimal chaotic map derived by
multi-objective optimization using abc algorithm, Nonlinear Dyn. 105 (2021), no. 2, 1885–1909.
[45] D. Trujillo-Toledo, O. L´opez-Bonilla, E. Garcia-Guerrero, E. Tlelo-Cuautle, D. L´opez-Mancilla, O. Guill´enFern´andez, and E. Inzunza-Gonz´alez, Real-time rgb image encryption for iot applications using enhanced sequences from chaotic maps, Chaos, Solitons Fractals 153 (2021), 111506.
[46] A.S. Unde and P. Deepthi. Design and analysis of compressive sensing-based lightweight encryption scheme for
multimedia iot, IEEE Trans. Circ. Syst. II: Express Briefs 67 (2019), no. 1, 167–171.
[47] H. Wang, J. Wang, Y.-C. Geng, Y. Song and J.-Q. Liu, Quantum image encryption based on iterative framework
of frequency-spatial domain transforms, Int. J. Theor. Phys. 56 (2017), no. 10, 3029–3049.
[48] J. Wu, X. Liao and B. Yang, Image encryption using 2d he´non-sine map and dna approach, Signal Process. 153
(2018), 11–23.
[49] W. Zhang, Z. Zhu and H. Yu, A symmetric image encryption algorithm based on a coupled logistic–bernoulli map
and cellular automata diffusion strategy, Entropy 21 (2019), no. 5, 504.
[50] X. Zhang, G. Zhu and S. Ma, Remote-sensing image encryption in hybrid domains, Optics Commun. 285 (2012),
no. 7, 1736–1743.