[1] S. Lian, “A Block Cipher Based on Chaotic Neural Networks,” Neurocomputing, Vol. 72, No. 4-6, 2009, pp. 1296-1301. doi:10.1016/j.neucom.2008.11.005
[2] R. Matthews, “On the Derivation of a chaotic Encryption Algorithm,” Cryptologia, Vol. 13, No. 1, 1989, pp. 29-42. doi:10.1080/0161-118991863745
[3] Z. Li and D. Xu, “A Secure Communication Scheme Using Projective Chaos Synchronization,” Chaos, Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 477-481. doi:10.1016/j.chaos.2004.02.019
[4] F.-Y. Wang and G.-W. Cui, “A New Image Encryption Algorithm Based on the Logistic Chaotic System,” The 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu, 9-11 July 2010, pp. 192-194.
[5] C. M. Li and L. X. Hong, “A New Image Encryption Scheme Based on Hyperchaotic Sequences,” IEEE International Workshop on Anti-Counterfeiting, Security, Identification, Xiamen, 16-18 April 2007, pp. 237-240.
[6] Y. Cheng, S. Yang and S.-F. Li, “Image Encryption of Multiple Keys Method Based on Chaotic Maps,” First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), Harbin, 17-19 September 2010, pp. 891-894. doi:10.1109/PCSPA.2010.220
[7] M. Ashtiyani, P. M. Birgani and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography,” The 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, 7-11 April 2008, pp. 1-5.
[8] M. Ahmad, C. Gupta and A. Varshney, “Digital Image Encryption Based on Chaotic Map for Secure Transmission,” International Multimedia Signal Processing and Communication Technologies, Aligarh, 14-16 March 2009, pp. 292-295. doi:10.1109/MSPCT.2009.5164233
[9] D. Socek, S. Li, S. S. Magliveras and B. Furht, “Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption,” First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 5-9 September 2005, pp. 406-407.
[10] G. Alvarez, F. Montoya, M. Romera and G Pastor, “Cryptanalysis of an Ergodic Chaotic Cipher,” Physics Letters A, Vol. 311, No. 2-3, 2003, pp. 172-179. doi:10.1016/S0375-9601(03)00469-9
[11] A. Awad, S. E. Assad, Q. Wang, C. Vladeanu and B. Bakhache, “Comparative Study of 1-D Chaotic Generators for Digital Data Encryption,” International Journal of Computer Science, Vol. 35, No. 4, 2008, pp. 483-488.
[12] A. Awad, “A New Chaos-Based Cryptosystem for Secure Transmitted Images,” IEEE Transactions on Computers, No. 99, 2011, p. 1.
[13] C. X. Zhu, Z. G. Chen and W. W. Ouyang, “A New Image Encryption Algorithm Based on General Chen’s Chaotic System,” Journal of Central South University of Technology, Vol. 37, No. 6, 2006, pp. 1142-1148.
[14] C. K. Huang and H. H. Nein, “Multi Chaotic Systems Based Pixel Shuffle for Image Encryption,” Optics Communication, Vol. 282, No. 11, 2009, pp. 2123-2127
[15] A. Abid, Q. Nasir and A. Elwakil, “Implementation of an Encrypted Wireless Communication System Using Nested Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 20, No. 12, 2010, pp. 4087-4096. doi:10.1142/S0218127410027957
[16] S. Li, G. Chen and X. Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, 2005, pp. 3119-3151. doi:10.1142/S0218127405014052
[17] T. Addabbo, M. Alioto, A. Fort, S. Rocchi and V. Vignoli, “A Feedback Strategy to Improve the Entropy of a Chaos-Based Random Bit Generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, 2006, pp. 326-337. doi:10.1109/TCSI.2005.856670
[18] M. Drutarovsky and P. Galajda, “Chaos-Based True Random Number Generator Embedded in a Mixed-Signal Reconfigurable Hardware,” Journal of Electrical Engineering, Vol. 57, No. 4, 2006, pp. 218-225.
[19] A. M. Abid, “An Implementation of Chaotic Encryption in Wireless Voice Transmission,” M.Sc. Thesis, University of Sharjah, Sharjah, 2009.