[1] A. A. Abdulla, H. Sellahewa, S. A. Jassim, Improving embedding efficiency for digital steganography by exploiting
similarities between secret and cover images, Multimedia Tools and Applications, 78(13) (2019), 17799-17823.
[2] A. Arab, M. J. Rostami, B. Ghavami, An image encryption method based on chaos system and AES algorithm, The
Journal of Supercomputing, 75(10) (2019), 6663-6682.
[3] S. Bahrami, M. Naderi, Image encryption using a lightweight stream encryption algorithm, Advances in Multimedia,
2012 (2012). DOI: 10.1155/2012/767364.
[4] P. V. de Campos Souza, E. Lughofer, A. J. Guimaraes, An interpretable evolving fuzzy neural network based on
self-organized direction-aware data partitioning and fuzzy logic neurons, Applied Soft Computing, (2021), 107829.
[5] Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. Raymond Choo, Z. Qin, Deepkeygen: A deep learning-based stream
cipher generator for medical image encryption and decryption, IEEE Transactions on Neural Networks and Learning
Systems, 33(9) (2021), 4915-4929.
[6] R. Enayatifar, A. Hanan Abdullah, I. Fauzi Isnin, Chaos-based image encryption using a hybrid genetic algorithm
and a DNA sequence, Optics and Lasers in Engineering, 56 (2014), 83-93.
[7] R. Enayatifar, A. Hanan Abdullah, I. Fauzi Isnin, A. Altameem, M. Lee, Image encryption using a synchronous
permutation-diffusion technique, Optics and Lasers in Engineering, 90 (2017), 146-154.
[8] S. Fatima Raza, V. Satpute, A novel bit permutation-based image encryption algorithm, Nonlinear Dynamics, 95(2)
(2019), 859-873.
[9] Y. Hashemi, Design a new image encryption using fuzzy integral permutation with coupled chaotic maps, International
Journal of Research in Computer Science, 3(1) (2013), 27.
[10] H. Hermassi, R. Rhouma, S. Belghith, Improvement of an image encryption algorithm based on hyper-chaos,
Telecommunication Systems, 52(2) (2013), 539-549.
[11] N. N. Hurrah, S. A. Parah, N. A. Loan, J. A. Sheikh, M. Elhoseny, K. Muhammad, Dual watermarking framework
for privacy protection and content authentication of multimedia, Future Generation Computer Systems, 94 (2019),
654-673.
[12] M. Kaur, V. Kumar, A comprehensive review on image encryption techniques, Archives of Computational Methods
in Engineering, 27(1) (2020), 15-43.
[13] A. Kumar, R. Rhouma, Y. Wang, N. Sklavos, M. K. Ghose, Comments on,“a blind source separation-based method
for multiple images encryption”, Communications in Nonlinear Science and Numerical Simulation, 16(3) (2011),
1675-1686.
[14] P. Kumar Naskar, S. Bhattacharyya, D. Nandy, A. Chaudhuri, A robust image encryption scheme using chaotic
tent map and cellular automata, Nonlinear Dynamics, 100(3) (2020), 2877-2898.
[15] C. Li, G. Luo, K. Qin, C. Li, An image encryption scheme based on chaotic tent map, Nonlinear Dynamics, 87(1)
(2017), 127-133.
[16] Y. P. Li, C. Wang, H. Chen, A hyper-chaos-based image encryption algorithm using pixel-level permutation and
bit-level permutation, Optics and Lasers in Engineering, 90 (2017), 238-246.
[17] X. Li, L. Wang, Y. Yan, P. Liu, An improvement color image encryption algorithm based on DNA operations and
real and complex chaotic systems, Optik, 127(5) (2016), 2558-2565.
[18] W. Liu, K. Sun, C. Zhu, A fast image encryption algorithm based on chaotic map, Optics and Lasers in Engineering,
84 (2016), 26-36.
[19] J. Liu, S. Tang, J. Lian, Y. Ma, X. Zhang, A novel fourth order chaotic system and its algorithm for medical image
encryption, Multidimensional Systems and Signal Processing, 30(4) (2019), 1637-1657.
[20] T. Manoj Kumar, P. Karthigaikumar, Fpga implementation of an optimized key expansion module of AES algorithm
for secure transmission of personal ECG signals, Design Automation for Embedded Systems, 22(1) (2018), 13-24.
[21] P. Mathivanan, A. Balaji Ganesh, Qr code based color image cryptography for the secured transmission of ECG
signal, Multimedia Tools and Applications, 78(6) (2019), 6763-6786.
[22] J. M. Mendel, Human-inspired-zadeh-sets and logic, In 2020 IEEE International Conference on Fuzzy Systems
(FUZZ-IEEE), (2020), 1-5.
[23] K. Mirzaei Talarposhti, M. Khaki Jamei, A secure image encryption method based on dynamic harmony search
(DHS) combined with chaotic map, Optics and Lasers in Engineering, 81 (2016), 21-34.
[24] L. Na, W. Jing, A new defuzzification method for enhance performance of fuzzy logic control system, In Software
Engineering and Knowledge Engineering: Theory and Practice, Springer, (2012), 403-409.
[25] B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, M. R. Mosavi, A simple, sensitive and secure image encryption
algorithm based on hyper-chaotic system with only one round diffusion process, Multimedia Tools and Applications,
71(3) (2014), 1469-1497.
[26] C. Pak, L. Huang, A new color image encryption using combination of the 1d chaotic map, Signal Processing, 138
(2017), 129-137.
[27] P. Ping, F. Xu, Z. J. Wang, Image encryption based on non-Affine and balanced cellular automata, Signal Processing,
105 (2014), 419-429.
[28] G. R. S. Qaid, S. N. Talbar, Encrypting image by using fuzzy logic algorithm, International Journal of Image
Processing and Vision Sciences (IJIPVS), 2(1) (2013), 25-29.
[29] A. G. Radwan, S. H. Abd-El-Haleem, S. K. Abd-El-Hafiz, Symmetric encryption algorithms using chaotic and
non-chaotic generators: A review, Journal of Advanced Research, 7(2) (2016), 193-208.
[30] M. J. Rostami, S. Saryazdi, H. Nezamabadi-pour, A. Shahba, Chaos-based image encryption using sum operation
modulo 4 and 256, IETE Journal of Research, 62(2) (2016), 179-188.
[31] M. J. Rostami, A. Shahba, S. Saryazdi, H. Nezamabadi-pour, A novel parallel image encryption with chaotic
windows based on logistic map, Computers and Electrical Engineering, 62 (2017), 384-400.
[32] M. Roy, K. Mali, S. Chatterjee, S. Chakraborty, R. Debnath, S. Sen, A study on the applications of the biomedical
image encryption methods for secured computer aided diagnostics, In 2019 Amity International Conference on
Artificial Intelligence (AICAI), (2019), 881-886.
[33] M. A. Salman, N. Ismat Seno, A comparison of Mamdani and Sugeno inference systems for a satellite image
classification, Anbar Journal for Engineering Sciences, (2010). DOI: 10.1109/WAC.2006.376033.
[34] N. Saravanan, A. Umamakeswari, Hap-cp-abe based encryption technique with hashed access policy based authentication scheme for privacy preserving of PHR, Microprocessors and Microsystems, 80 (2021), 103540.
[35] S. M. Seyedzadeh, B. Norouzi, S. Mirzakuchaki, RGB color image encryption based on choquet fuzzy integral,
Journal of Systems and Software, 97 (2014), 128-139.
[36] K. U. Shahna, A. Mohamed, A novel image encryption scheme using both pixel level and bit level permutation with
chaotic map, Applied Soft Computing, 90 (2020), 106162.
[37] M. Shariatzadeh, M. J. Rostami, M. Eftekhari, Proposing a novel dynamic aes for image encryption using a chaotic
map key management approach, Optik, 246 (2021), 167779.
[38] S. J. Sheela, K. V. Suresh, D. Tandur, Image encryption based on modified henon map using hybrid chaotic shift
transform, Multimedia Tools and Applications, 77(19) (2018), 25223-25251.
[39] C. Y. Song, Y. L. Qiao, X. Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Optik-
International Journal for Light and Electron Optics, 124(18) (2013), 3329-3334.
[40] J. Tang, Z. Yu, L. F. Liu, A delay coupling method to reduce the dynamical degradation of digital chaotic maps and
its application for image encryption, Multimedia Tools and Applications, 78(17) (2019), 24765-24788.
[41] D. Torres-Mu˜noz, H. V´azquez-Leal, C. Hern´andez-Mej´ıa, Exploring a novel fusion-scheme based on mathematical
equation system for encryption-image algorithm, Multimedia Tools and Applications, 79(33) (2020), 24873-24888.
[42] X. Y.Wang, Q.Wang, Y. Q. Zhang, A fast image algorithm based on rows and columns switch, Nonlinear Dynamics,
79(2) (2015), 1141-1149.
[43] X. J. Wu, H. Kan, J. Kurths, A new color image encryption scheme based on DNA sequences and multiple improved
1d chaotic maps, Applied Soft Computing, 37 (2015), 24-39.
[44] J. Wu, X. F. Liao, B. Yang, Image encryption using 2d h´enon-sine map and dna approach, Signal Processing, 153
(2018), 11-23.
[45] H. Xiang, L. F. Liu, An improved digital logistic map and its application in image encryption, Multimedia Tools
and Applications, 79(41) (2020), 30329-30355.
[46] H. Xu, K. Thakur, A. S. Kamruzzaman, Md. Liakat Ali, Applications of cryptography in database: A review, In
2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2021), 1-6.
[47] A. Yaghouti Niyat, M. H. Moattar, M. Niazi Torshiz, Color image encryption based on hybrid hyper-chaotic system
and cellular automata, Optics and Lasers in Engineering, 90 (2017), 225-237.
[48] G. Ye, K. W. Wong, An efficient chaotic image encryption algorithm based on a generalized Arnold map, Nonlinear
Dynamics, 69(4) (2012), 2079-2087.
[49] B. Yosefnezhad Irani, P. Ayubi, F. Amani Jabalkandi, M. Yousefi Valandar, M. Jafari Barani, Digital image
scrambling based on a new one-dimensional coupled sine map, Nonlinear Dynamics, 97(4) (2019), 2693-2721.
[50] M. Zakariya Talhaoui, X. Y. Wang, M. Amine Midoun, Fast image encryption algorithm with high security level
using the b¨ulban chaotic map, Journal of Real-Time Image Processing, 18(1) (2021), 85-98.
[51] Y. Zhang, Test and verification of AES used for image encryption, 3D Research, 9(1) (2018), 1-27.
[52] Y. Zhang, X. Q. Li, W. Hou, A fast image encryption scheme based on AES, In 2017 2nd International Conference
on Image, Vision and Computing (ICIVC), (2017), 624-628.
[53] Y. Zhang, Y. J. Tang, A plaintext-related image encryption algorithm based on chaos, Multimedia Tools and
Applications, 77(6) (2018), 6647-6669.