1.
Y. Gong, C. Zhang, Y. Fang, and J. Sun, “Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing,” IEEE Trans. Emerg. Top. Comput., vol. 6, no. 1, pp. 110–121, 2018, doi: 10.1109/TETC.2015.2490021.
2.
W. Li et al., “Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing,” IEEE J. Biomed. Heal. Informatics, vol. 23, no. 3, pp. 1278–1289, 2019, doi: 10.1109/JBHI.2018.2850304.
3.
X. Li, J. Yuan, H. Ma, and W. Yao, “Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 8, pp. 1917–1931, 2018, doi: 10.1109/TIFS.2018.2806925.
4.
D. S. Laiphrakpam and M. S. Khumanthem, “Medical image encryption based on improved ElGamal encryption technique,” Optik (Stuttg)., vol. 147, pp. 88–102, 2017, doi: 10.1016/j.ijleo.2017.08.028.
5.
R. Enayatifar, A. H. Abdullah, and M. Lee, “A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption,” Opt. Lasers Eng., vol. 51, no. 9, pp. 1066–1077, 2013, doi: 10.1016/j.optlaseng.2013.03.010.
6.
D. Ravichandran, P. Praveenkumar, J. B. Balaguru Rayappan, and R. Amirtharajan, “Chaos based crossover and mutation for securing DICOM image,” Comput. Biol. Med., vol. 72, pp. 170–184, 2016, doi: 10.1016/j.compbiomed.2016.03.020.
7.
D. He, N. Kumar, M. K. Khan, L. Wang, and J. Shen, “Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services,” IEEE Syst. J., vol. 12, no. 2, pp. 1621–1631, 2018, doi: 10.1109/JSYST.2016.2633809.
8.
Z. Deng and S. Zhong, “A digital image encryption algorithm based on chaotic mapping,” J. Algorithms Comput. Technol., vol. 13, pp. 1–11, 2019, doi: 10.1177/1748302619853470.
9.
J. Zhao, S. Wang, Y. Chang, and X. Li, “A novel image encryption scheme based on an improper fractional-order chaotic system,” Nonlinear Dyn., vol. 80, no. 4, pp. 1721–1729, 2015, doi: 10.1007/s11071-015-1911-x.
10.
Q. Lu, C. Zhu, and X. Deng, “An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box,” IEEE Access, vol. 8, pp. 25664–25678, 2020, doi: 10.1109/ACCESS.2020.2970806.
11.
G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004, doi: 10.1016/j.chaos.2003.12.022.
12.
Y. Dai, H. Wang, and Y. Wang, “Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition,” Int. J. Pattern Recognit. Artif. Intell., vol. 30, no. 4, pp. 1–15, 2016, doi: 10.1142/S0218001416570019.
13.
S. Ibrahim et al., “Framework for Efficient Medical Image Encryption Using Dynamic S-Boxes and Chaotic Maps,” IEEE Access, vol. 8, pp. 160433–160449, 2020, doi: 10.1109/ACCESS.2020.3020746.
14.
J. C. Dagadu, J. P. Li, and E. O. Aboagye, “Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion,” Wirel. Pers. Commun., vol. 108, no. 1, pp. 591–612, 2019, doi: 10.1007/s11277-019-06420-z.
15.
M. Gafsi, N. Abbassi, M. A. Hajjaji, J. Malek, and A. Mtibaa, “Improved chaos-based cryptosystem for medical image encryption and decryption,” Sci. Program., vol. 2020, 2020, doi: 10.1155/2020/6612390.
16.
K. Jain, A. Aji, and P. Krishnan, “Medical Image Encryption Scheme Using Multiple Chaotic Maps,” Pattern Recognit. Lett., vol. 152, pp. 356–364, 2021, doi: 10.1016/j.patrec.2021.10.033.
17.
Z. Liang, Q. Qin, C. Zhou, N. Wang, Y. Xu, and W. Zhou, Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation, vol. 16, no. 11 November. 2021.
18.
M. Z. Talhaoui and X. Wang, “A new fractional one dimensional chaotic map and its application in high-speed image encryption,” Inf. Sci. (Ny)., vol. 550, pp. 13–26, 2021, doi: https://doi.org/10.1016/j.ins.2020.10.048.
19.
A. Girdhar, H. Kapur, and V. Kumar, “A novel grayscale image encryption approach based on chaotic maps and image blocks,” Appl. Phys. B Lasers Opt., vol. 127, no. 3, 2021, doi: 10.1007/S00340-021-07585-X.
20.
J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic Lightweight Cryptosystem for Image Encryption,” Adv. Multimed., vol. 2021, p. 5527295, 2021, doi: 10.1155/2021/5527295.
21.
M. Lyle, P. Sarosh, and S. A. Parah, “Adaptive image encryption based on twin chaotic maps,” Multimed. Tools Appl., vol. 81, no. 6, pp. 8179–8198, 2022, doi: 10.1007/s11042-022-11917-0.
22.
S. Zhu, G. Wang, and C. Zhu, “A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes,” Entropy , vol. 21, no. 8. 2019, doi: 10.3390/e21080790.
23.
H. Zhong and G. Li, “Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling,” Multimed. Tools Appl., 2022, doi: 10.1007/s11042-022-12479-x.
24.
Y. Liu, J. Zhang, D. Han, P. Wu, Y. Sun, and Y. S. Moon, “A multidimensional chaotic image encryption algorithm based on the region of interest,” Multimed. Tools Appl., vol. 79, no. 25, pp. 17669–17705, 2020, doi: 10.1007/s11042-020-08645-8.
25.
M. A. Ben Farah, A. Farah, and T. Farah, “An image encryption scheme based on a new hybrid chaotic map and optimized substitution box,” Nonlinear Dyn., vol. 99, no. 4, pp. 3041–3064, 2020, doi: 10.1007/s11071-019-05413-8.
26.
A. Mansouri and X. Wang, “A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme,” Inf. Sci. (Ny)., vol. 520, pp. 46–62, 2020, doi: https://doi.org/10.1016/j.ins.2020.02.008.
27.
C. Zou, Q. Zhang, X. Wei, and C. Liu, “Image Encryption Based on Improved Lorenz System,” IEEE Access, vol. 8, pp. 75728–75740, 2020, doi: 10.1109/ACCESS.2020.2988880.
28.
R. Vidhya and M. Brindha, “A novel conditional Butterfly Network Topology based chaotic image encryption,” J. Inf. Secur. Appl., vol. 52, p. 102484, 2020, doi: https://doi.org/10.1016/j.jisa.2020.102484.
29.
R. I. Abdelfatah, “A new fast double-chaotic based Image encryption scheme,” Multimed. Tools Appl., vol. 79, no. 1, pp. 1241–1259, 2020, doi: 10.1007/s11042-019-08234-4.
30.
M. Z. Talhaoui, X. Wang, and A. Talhaoui, “A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme,” Vis. Comput., vol. 37, no. 7, pp. 1757–1768, 2021, doi: 10.1007/s00371-020-01936-z.
31.
M. T. Elkandoz and W. Alexan, “Image encryption based on a combination of multiple chaotic maps,” Multimed. Tools Appl., 2022, doi: 10.1007/s11042-022-12595-8.
32.
S. K.U. and A. Mohamed, “Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion,” Signal Process. Image Commun., vol. 99, p. 116495, 2021, doi: https://doi.org/10.1016/j.image.2021.116495.
33.
“E. N. Lorenz, ‘“Deterministic nonperiodic flow,”’J. Atmos. Sci., vol. 20,no. 2, pp. 130–141, 1963.”
34.
S. Li, L. Zhao, and N. Yang, “Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/6624809.
35.
F. Masood et al., “A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations,” Wirel. Pers. Commun., no. 0123456789, 2021, doi: 10.1007/s11277-021-08584-z.
36.
S. Dhall, S. K. Pal, and K. Sharma, “A chaos-based probabilistic block cipher for image encryption,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 1, pp. 1533–1543, 2022, doi: https://doi.org/10.1016/j.jksuci.2018.09.015.
37.
M. Alawida, A. Samsudin, J. Sen Teh, and R. S. Alkhawaldeh, “A new hybrid digital chaotic system with applications in image encryption,” Signal Processing, vol. 160, pp. 45–58, 2019, doi: https://doi.org/10.1016/j.sigpro.2019.02.016.
38.
D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” J. King Saud Univ. - Comput. Inf. Sci., 2022, doi: https://doi.org/10.1016/j.jksuci.2022.04.002.