[1] X. Wang, X. Zhu, X. Wu, and Y. Zhang, “Image Encryption Algorithm Based on Multiple Mixed Hash Functions and Cyclic Shift,” OPT. LASER ENG., vol. 107, pp. 370-379, 2018.##
[2] Q. Zhang, L. Guo, and X. Wei, “A Novel Image Fusion Encryption Algorithm Based on DNA Sequence Operation and Hyper-Chaotic System,” OPTIK, vol. 124, no. 18, pp. 3596-3600, 2013.##
[3] M. Ahmadipari and M. Moradi, “A New Approach for Grayscale Image Encryption Using Beness Interconnection Networks and Logistic Map Chaos Function,” Electronic and Cyber Defense, vol. 6, no. 1, pp. 37-46, 2017 (In Persian).##
[4] M. Khan and T. Shah, “A Novel Image Encryption Technique Based on Hénon Chaotic Map and S8 Symmetric Group,” Neural Comput. Appl., vol. 25, no. 7-8, pp. 1717-1722, 2014.##
[5] P. K. Sharma, M. Ahmad, and P. M. Khan, “Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation,” In Int. Symposium on Security in Computing and Communication, Springer, pp. 173-181, 2014.##
[6] S. Xu, Y. Wang, Y. Guo, and C. Wang, “A Novel Image Encryption Scheme Based on a Nonlinear Chaotic Map,” IJIGSP, vol. 2, no. 1, p. 61, 2010.##
[7] M. J. Rostami, A. Shahba, S. Saryazdi, and H. Nezamabadipour, “A Novel Parallel Image Encryption with Chaotic Windows Based on Logistic Map,” Comput. Electr. Eng., vol. 62, pp. 384-400, 2017.##
[8] Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based Chaotic System for Image Encryption,” Inform. Sciences, vol. 480, pp. 403-419, 2019.##
[9] A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” J. of Passive Defence Science and Technology, 2011 (In Persian).##
[10] Y. Wu, J. P. Noonan, G. Yang, and H. Jin, “Image Encryption Using the Two-dimensional Logistic Chaotic Map,” J. Electron. Imaging, vol. 21, no. 1, p. 013014, 2012.##
[11] B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A Novel Image Encryption Based on Row-Column, Masking and Main Diffusion Processes with Hyper Chaos,” Multimed. Tools Appl., vol. 74, no. 3, pp. 781-811, 2015.##
[12] S. El Assad and M. Farajallah, “A New Chaos-based Image Encryption System,” Signal Process-Image, vol. 41, pp. 144-157, 2016.##
[13] B. Murugan and A. G. N. Gounder, “Image Encryption Scheme Based on Block-based Confusion and Multiple Levels of Diffusion,” IET. COMPUT. VIS., vol. 10, no. 6, pp. 593-602, 2016.##
[14] A. Belazi, M. Khan, A. El-Latif, and S. Belghith, “Efficient Cryptosystem Approaches: S-boxes and Permutation–substitution-based Encryption,” Nonlinear Dynam., vol. 87, no. 1, pp. 337-361, 2017.##
[15] B. Mondal, P. Kumar, and S. Singh, “A Chaotic Permutation and Diffusion Based Image Encryption Algorithm for Secure Communications,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31177-31198, 2018.##
[16] A. Farajollahzadeh and F. Motiei, “Image Encryption Based Using Three-dimensional Logistic Chaotic Map,” 5th Int. Conf. on Electrical and Computer Engineering, 2018 (In Persian).##
[17] I. Hussain, T. Shah, H. Mahmood, and M. A. Gondal, “Construction of S8 Liu J S-boxes and their Applications,” Comput. Math Appl., vol. 64, no. 8, pp. 2450-2458, 2012.##
[18] F. Özkaynak, V. Çelik, and A. B. Özer, “A New S-box Construction Method Based on the Fractional-order Chaotic Chen System,” Signal Image Video P, vol. 11, no. 4, pp. 659-664, 2017.##
[19] X. Wang and C. Liu, “A Novel and Effective Image Encryption Algorithm Based on Chaos and DNA Encoding,” Multimed. Tools Appl., vol. 76, no. 5, pp. 6229-6245, 2017.##
[20] J. Ma, Z. Chen, Z. Wang, and Q. Zhang, “A Four-wing hyper-Chaotic Attractor Generated from a 4-D Memristive System with a Line Equilibrium,” Nonlinear Dynam., vol. 81, no. 3, pp. 1275-1288, 2015.##
[21] F. ul Islam and G. Liu, “Designing S-box Based on 4D-4wing Hyperchaotic System,” 3D Res, vol. 8, no. 1, p. 9, 2017.##
[22] T. W. Hungerford, “Abstract Algebra: An Introduction,” Cengage Learning, 2012.##
[23] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” Booz-Allen and Hamilton Inc. Mclean Va, 2001.##
[24] P. Ping, F. Xu, Y. Mao, and Z. Wang, “Designing Permutation–substitution Image Encryption Networks with Henon Map,” Neurocomputing, vol. 283, pp. 53-63, 2018.##