参考文献/References:
[1] MORABITO R,PETROLO R,LOSCRI V,et al. LEGIoT:A lightweight edge gateway for the Internet of Things[J]. Future generation computer systems,2018,81(1):1-15.
[2]ELHOSENY M,SHANKAR K,LAKSHMANAPRABU S K,et al. Hybrid optimization with cryptography encryption for medical image security in Internet of Things[J]. Neural computing and applications,2020,32(15):10979-10993.
[3]宫帅,霍橙,谢冬. 基于压缩感知和DNA编码的图像加密算法[J]. 南京师范大学学报(工程技术版),2021,21(1):8-14.
[4]SHAH A A,PARAH S A,RASHID M,et al. Efficient image encryption scheme based on generalized logistic map for real time image processing[J]. Journal of real-time image processing,2020,17(6):2139-2151.
[5]肖成龙,孙颖,林邦姜,等. 基于神经网络与复合离散混沌系统的双重加密方法[J]. 电子与信息学报,2020,42(3):687-694.
[6]李付鹏,刘敬彪,王光义,等. 基于混沌集的图像加密算法[J]. 电子与信息学报,2020,42(4):981-987.
[7]?KAYNAK F. Brief review on application of nonlinear dynamics in image encryption[J]. Nonlinear dynamics,2018,92(2):305-313.
[8]RAJAGOPALAN S,JANAKIRAMAN S,RENGARAJAN A. Medical image encryption:microcontroller and fpga perspective[M]. Medical Data Security for Bioengineers. IGI Global,Hershey,Pennsylvania,USA,2019:278-304.
[9]HUA Z,XU B,JIN F,et al. Image encryption using Josephus problem and filtering diffusion[J]. IEEE access,2019,7(1):8660-8674.
[10]TALHAOUI M Z,WANG X,TALHAOUI A. A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme[J]. The visual computer,2021,37(7):1757-1768.
[11]SHAKIR H R. An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling[J]. Multimedia tools and applications,2019,78(18):26073-26087.
[12]张勋才,刘奕杉,崔光照. 基于DNA编码和超混沌系统的图像加密算法[J]. 计算机应用研究,2019,36(4):1139-1143.
[13]王勇,方小强,王瑛. 超混沌系统和AES结合的图像加密算法[J]. 计算机工程与应用,2019,55(8):164-170.
[14]MANIYATH S R,THANIKAISELVAN V. A novel efficient multiple encryption algorithm for real time images[J]. International journal of electrical and computer engineering,2020,10(2):1327-1336.
[15]SIDDAVAATAM P,SEDAGHAT R. A novel architecture with scalable security having expandable computational complexity for stream ciphers[J]. Facta universitatis,series:electronics and energetics,2017,30(4):459-475.
[16]De la FRAGA L G,MANCILLAS L C,TLELO C E. Designing an authenticated Hash function with a 2D chaotic map[J]. Nonlinear dynamics,2021,104(1):4569-4580.
[17]INZUNZA G E,CRUZ HC. Double hyperchaotic encryption for security in biometric systems[J]. Nonlinear dynamics and systems theory,2013,13(1):55-68.
[18]屈凌峰,陈帆,和红杰,等. 基于位平面-块置乱的图像加密算法安全性分析[J]. 应用科学学报,2019,37(5):631-642.