E. Hoseyni and SH. B. shokuhi, “Image scramble using chaotic function,” 9th conference of Electronic Engineering of IRAN, Elm & Sanaat university. (In Persian).
S. A. Isfahani and D. Bakhshesh, “A hybrid method for scrambling image using Hyperchaotic function and Evolutionary operators,” Eighth international conference of Security Community of iran, Mashhad university, 23 and 24th, 2012. (In Persian)
M. Abieshagh and M. Eftekhari, “ninth symposium on Advances in Science and Technology,” Mashhad, 13 Azar of 2015. (In Persian)
C. Li and D. Lin, “Cryptanalysis of an Image Scrambling Encryption Algorithm,” College of Information Engineering, Xiangtan University, Xiangtan 411105, Hunan, China, 2016.
A. Musarrat and C. Wook Ahn, “Millie Pant, A robust image watermarking technique using SVD and differential evolution in DCT domain,” Elsevier, 2014.
P. Premaratne and M. Premaratne, “Key-based sxrambling for secure image communicatin,” in Emerging Intelligent Computing Technology and Applications, University of Wollongong, 2012.
L. Wu, J. Zhang, w. Deng, and D. He, “Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm,” IEEE, ICISE, 2009.
D. Vang, C.-C. Chang, Y. Liu, G. Song, and Y. Liu, “Digital Image Scrambling Algorithm Based on Chaotic Sequence Decomposition and Recombinatic of Pixel Values,” International Journal of Network Security, 2015.
M. Li, T. Liang, and Y.-j. He, “Arnold Transform Based Image Scrambling Method,” Atlantis Press, 2013.
X. Zhang, G. Zhu, W. Wang, M. Wang, and S. Ma, “Period Law of Discrete Two-dimensional Arnold Transformation,” IEEE, 2010.
R. Stone and K. Price, “Differential Evolution, A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces,” Journal of Global Optimization, 1997.
K. Tomar, “A Review Paper of Different Techniques on Digital Image Watermarking Scheme for Robustness,” IJARCSSE, vol. 5, Issue2, 2015.
A. Jadhav and M. kolhekar, “Digital Watermarking in Video for Copy Right Protection,” IEEE, ICESC, 2014.
R. Bala, “A Brief Survey on Robust Video Watermarking Techniques, IJES, vol. 4, Issue2, 2015.
A. Phadikar, S. P. Maity, and B. Verma, “Region based QIM digital watermarking scheme for image database in DCT domain,” Comput. Electr. Eng., vol. 37, 2011.
H. H. Tsai, Y. J. Jhuang, and Y. S. Lai, “An SVD based image watermarking in wavelet domain using SVR and PSO,” Appl. Soft Comput., 2012.
S. Tyagi, H. V. Singh, R. Agarwal, and S. K. Gangwar, “International Cnference on Emergind Trends in Electrical Electronics & Sustainable Energy systems,” IEEE, 2016.
S. Pathak, S. Tiwari, and S. Agarwal, “Digital Image Watermarking in Wavelet Domain using chaotic Sequence,” International Conference on Futuristic Trends in Engineering, Science, Humanities, and Technology January, Gwalior, 2016.
Hemani and S. Singh, “A survey of Digital Watermarking Techniques and Performance Evaluation Metrics,” International Journal of Engineering Trends and Technology, IJETT, April 2017.
N. Tiwari and Sharmila, “Digital Watermarking Applications, Parameter Measures and Techniques,” International Journal of Computer Science and Network Security, IJCSNS, March 2017.
M. Iwan, R. Akmeliawati, T. Faisal, and H. Al-Assadi, “Performance Comparison of Differential Evolution and Particle Swarm Optimization In Constrained Optimization,” Procedia Engineering, 2012.
P. Civicioglu and E. Bosdok, “A conceptual comparison of the Cuckoo-search,” particle swarm optimization, differential evolution and artificial bee colony algorithms, Artificial Intelligence, April 2013.
B. Hegerty, C. Hung, and K. Kasprak, “A Comparative Study on Differential Evolution and Genetic Algorithms for Some Combinatorial Problems,” IEEE, 2008.
J. Champan, “Matlab Programing for Engineers,” Thomson Learning, 2007.
C. Moler, “A proprietary programming language,” Mthworks.com. Available: https://www.mathworks.com