[1] SHANNON C E.Communication theory of secrecy systems[J].The Bell System Technical Journal,1949,28(4):656-715
[2] LI S J.Some basic cryptographic requirements for chaos-based cryptosystems[J].Int.J.Bifurcation and Chaos,2006,16(8):2129-2151
[3] FRIDRICH J.Symmetric ciphers based on two-dimensional chaotic maps[J].Int.J.Bifurcation and Chaos,1998,8(6):1259-1284
[4] CHEN G R,MAO Y B,CHUI C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons & Fractals,2004,21(3):749-761
[5] SALLEH M,IBRAHIM S,ISNIN I F.Enhanced chaotic image encryption algorithm based on chaotic maps[C].In IEEE Conf.Circuits and System,2003,2:508-511
[6] MAO Y B,CHEN G R,LIAN S.A novel fast image encryption scheme based on 3D chaotic baker maps[J].Int.J.Bifurc.Chaos,2004,14(10):3613-3624
[9] SALLEH M,IBRAHIM S,ISNIN I F.Enhanced chaotic image encryption algorithm based on baker's map[C].Proceedings of the 2003 International Symposium on Circuits and Systems.2003(2):508-511
[10] FENG Y,LI L J,HUANG F.A Symmetric image encryption approach based on line maps[C].Proc.of 1st International Symposium on Systems and Control in Aerospace and Astronautics,Harbin,China,2006:1362-1367