[1. A l-Saidi, N., G. Rushdan, M. S d. Using IFS as an Encryption Method. - In: ICET’2009, 275-278.10.1109/ICETC.2009.80]Search in Google Scholar
[2. Behnia, S., A. Akshani, H. Mahmodi, A. Akhava n. A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps. - Chaos Solitons and Fractals, Vol. 35, 2008, No 2, 408-419.10.1016/j.chaos.2006.05.011]Search in Google Scholar
[3. Celika, M. U., G. Sharma, A. M. Tekalp. Gray-Level-Embedded Lossless Image Compression. - Signal Processing: Image Communication, Vol. 18, 2003, No 6, 443-454.10.1016/S0923-5965(03)00023-7]Search in Google Scholar
[4. Chen, G., Y. Mao, C. K. Chui. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons and Fractals, Vol. 21, 2004, No 3, 749-761.10.1016/j.chaos.2003.12.022]Search in Google Scholar
[5. Chen, Y., L. Zhang, Y. Wa n g. A Data Encryption Algorithm Based on Dual Chaotic System. - In: International Conference on Computer Application and System Modeling, IEEE, 2010, 431-435.10.1109/ICCASM.2010.5620657]Search in Google Scholar
[6. Devaney, R. L. A First Course in Chaotic Dynamical Systems: Theory And Experiment. Addison-Wesley, 1992.]Search in Google Scholar
[7. Dikbas, S., F. Zhai. Lossless Image Compression using Adjustable Fractional Line-Buffer. - Signal Processing, Image Communication, Vol. 25, 2010, No 5, 345-351.10.1016/j.image.2010.02.004]Search in Google Scholar
[8. Gilbert, J. W. Modern Algebra with Applications. John Wiley and Sons, 1976.]Search in Google Scholar
[9. Grangetto, M., E. Magli, G. Olmo. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. - IEEE Trans. Multimedia, Vol. 8, 2006, No 5, 905-917.10.1109/TMM.2006.879919]Search in Google Scholar
[10. Huang, J., M. Long. A Novel Image Cryptosystem with Multiple Chaotic Maps. - In: Proc. of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, 4573-4576.10.1109/WICOM.2009.5302574]Search in Google Scholar
[11. Kim, H., J. Wen, J. Villasen o r. Secure Arithmetic Coding. - IEEE Trans. Signal Process., Vol. 55, 2007, No 5, 2263-2272.10.1109/TSP.2007.892710]Search in Google Scholar
[12. May, R. M. Simple Mathematical Models with Very Complicated Dynamics. - Nature, Vol. 261, 1976, No 459, 459-475.10.1038/261459a0934280]Search in Google Scholar
[13. May, R. M., G. F. Oster. Bifurcations and Dynamic Complexity in Simple Biological Models. - The American Naturalist, Vol. 110, 1976, 573-599.10.1086/283092]Search in Google Scholar
[14. Pastijn, H. Chaotic Growth with the Logistic Model of P.-F. Verhulst. − In: The Logistic Map and the Route to Chaos: From the Beginnings to Modern Applications. M. Ausloos, M. Dirickx, Eds. Springer-Verlag, 2006.]Search in Google Scholar
[15. Prasad, B., K. Katiya r. A Comparative Study of Logistic Map through Function Iteration. - In: Proc. Of the Int. Con. Emerging Trends in Engineering and Technology, Kurukshetra, India, 2010, 357-359.]Search in Google Scholar
[16. Prasad, B., K. Katiya r. Fractals via Ishikawa Iteration. - In: ICLICC2011, P. Balasubramaniam, Ed. Vol. 140. CCIS. Heidelberg, Springer, 2011, 197-203.10.1007/978-3-642-19263-0_24]Search in Google Scholar
[17. Wang, Y., K. W. Wong, X. Liao, T. Xiang, G. Chen. A Chaos Based Image Encryption Algorithm with Variable Control Parameters Chaos. Chaos Solitons and Fractals, Vol. 41, 2009, No 4, Elsevier, 1773-1783.10.1016/j.chaos.2008.07.031]Search in Google Scholar
[18. Wong, K. W., C. H. Yuen. Embedding Compression in Chaos-Based Cryptography. - IEEE Trans. Circuits Syst. II, Exp. Briefs, Vol. 55, 2008, No 11, 1193-1197.10.1109/TCSII.2008.2002565]Search in Google Scholar
[19. Wu, C. P., C. C. J. Kuo. Design of Integrated Multimedia Compression and Encryption Systems. - IEEE Trans. Multimedia, Vol. 7, 2005, No 5, 828-839.10.1109/TMM.2005.854469]Search in Google Scholar
[20. Xiao, H., S. Qiu, C. Deng. A Composite Image Encryption Scheme Using AES and Chaotic Series. - In: First International Symposium on Data, Privacy and e-Commerce, 2007, 277-279.]Search in Google Scholar
[21. Yoon, J. W., H. Kim. An Image Encryption Scheme with a Pseudorandom Permutation Based on Chaotic Maps. - Common Nonlinear Sci Numer Simulate, 2010, 3998-4006.10.1016/j.cnsns.2010.01.041]Search in Google Scholar
[22. Yoon, J. W., H. Kim, J. Villasen o r. Binary Arithmetic Coding with Keybased Interval Splitting. - IEEE Signal Process. Lett., Vol. 13, 2006, No 2, 69-72.10.1109/LSP.2005.861589]Search in Google Scholar
[23. Zhang, L., X. Liao, X. Wang. An Image Encryption Approach Based on Chaotic Maps. - Chaos, Solitons and Fractals, Vol. 24, 2005, No 3, 759-765.10.1016/j.chaos.2004.09.035]Search in Google Scholar