[1] A. Mirghadri and A. Jolfaei, “Survey: Image Encryption Using Salsa20,” IJCSI International Journal of Computer Science Issues, vol. 7, Issue .5, pp. 0814-1694, September 2010.##
[2] B. K. Singh, N. Sharma, N. Singla, N. Sharma, and N. Choudhary, “Image Encryption Using Block-Based Transformation Algorithm,” IJISET International Journal of Innovative Science, Engineering & Technology, vol. 1 Issue 3, May 2014.##
[3] M .A. Bani Younes and A. Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption,” IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 4, April 2008.##
[4] A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” IHU Passive Defence Sci. & Tech., vol. 2, pp. 111-124, 2011. (In Persian)##
[5] A. Mirghadri and A. Jolfaei, “An image encryption approach using chaos and stream cipher,” Journal of Theoretical and Applied Information Technology, Sep. 2010.##
[6] B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, “A simple sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia tools and applications, vol. 71, pp. 1469-1497, 2014.##
[7] Gh. R. Karamali and E. Kavand, “Designing Fast Algorithm to Encrypt Images Using The Chinese Remainder Theorem and Elliptic Curve,” Journal of Electronical & Cyber Defence, vol. 5, no. 3, Serial no. 19, 2017. (In Persian)##
[8] B. Fathi Vajargah, R. Asghari, and J. Vahidi, “Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator,” Journal of Electronical &Cyber Defence, vol. 4, no. 1, Serial no. 13, 2016. (In Persian)##
[10] F. Galton, “
The British Association: Section II, Anthropology: Opening address by Francis Galton, F.R.S., etc., President of the Anthropological Institute, President of the Section,” Nature, vol. 32 (830), pp. 507-510, Sep. 1985.##
[11] N. Ebrahimi, N. Y. Jalali, and E. Soofi, “Comparison, utility, and partition of dependence under absolutely continuous and singular distributions,” Journal of Multivariate Analysis,
vol. 131, pp. 32-50, Oct. 2014.##
[12] J. Daemen and V. Rijmen, “The block cipher Rijindael,” Proceedings of the Third Conference on smart card International Research and Applications, CARDIS’98, Lecture Notes in computer Science, vol. 1820, Springer, Berlin, 2000.##
[13] A. Canteaut and E. Filiol, “Ciphertext Only Reconstruction of LFSRbased Stream Ciphers,” Institute National de Recherche en Informatique et en Automatique (INRIA), Technical report no. 3887, Feb. 2000.##
[14] S. Thomas, D. Anthony, T. Berson, and G. Gong, “The W7 Stream Cipher Algorithm Internet Draft,” Apr. 2002.##
[15] J. Behboudian, “Non Parametric Statistic,” Shiraz University, 2004. (In Persian )##
[16] J. L. Rodgers and W.A. Nicewander, “Thirteen ways to look at the correlation coefficient,” The Amer. Statistician, vol. 42, pp. 59-66, Feb. 1988.##
[17] O. J. Dunn and V. A. Clark, “Applied Statistics: Analysis of Variance and Regression,” New York: Wiley, 1974.##
[18] E. K. Yen and R. G. Johnston, “The Ineffectiveness of the Correlation Coefficient for Image Comparisons,” Los Alamos National Laboratory, LA-UR-96-2474.##
[19] J. N. Kapur and M. Dhande, “On the entropy measure of stochastic dependence,” Indian journal of pure and applied mathematics, vol. 5(17), pp. 581-595, 1986.##
[20] T. M. Cover and J. A. Thomas, “Elements of Information Theory, 2nd ed,” John Wiley & Sons, Inc. Hoboken, NJ, USA, 2005.##
[21] D. J. C MacKay, “Information Theory, Inference, and Learning Algorithms,” 4th ed., Cambridge University Press: Cambridge, UK, 2003.##
[22] S. Kullback and R. A. Leibler, “On information and sufficiency,” Annals of Mathematical Statistics, vol. 22 (1), pp. 79–86, 1951.##
[23] S. Kullback, “Information Theory and Statistics,” Dover Publications, Inc. , 1968.##
[24] J. N. Kapur and M. Dhande, “On a family of normalized measure of inter dependence,” acta ciendica vol. XVI, M, 2, pp. 193-198, 1990.##
[25] H. J. Kim, “On information theoretic index for measuring the stochastic dependence among sets of variate,” Journal of Korean Stat. Society, vol. 26(1), pp. 131-146, 1997.##
[26] J. N. Kapur, “New measure of stochastic dependence,” IIT/ kapur Res. Rep. No. 243-109-1985.##
[27] J. N. Kapur, “Normalized measure of stochastic dependence,” IIT/kapur. Res. Rep. No. 279-110-1985.##
[28] H. Noura, L. Sleem, M. Noura, M. Mansour1, A. Chehab1, and R. Couturier, “A New Efficient Lightweight and Secure Image Cipher Scheme,” Multimedia Tools and Applications, Aug. 2017.##
[29] Fawaz.Z, Noura.H, and Mostefaoui.A, “An efficient and secure cipher scheme for images confidentiality preservation”, Signal Processing: Image Communication ,42,90–.108-.2016##