[1] J. Jin, “An image encryption based on elementary cellular automata,” Opt. Lasers Eng., vol. 50, no. 12, pp. 1836–1843, 2012, doi: 10.1016/j.optlaseng.2012.06.002.
[2] UU. nomor 43 tahun 2007, “On the design of perceptual MPEGVideo encryption algorithms.,” Pravoslavie.ru, 2007.
[3] M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Math. Probl. Eng., vol. 2021, no. i, 2021, doi: 10.1155/2021/5012496.
[4] Z. N. Abdulhameed, “Transmission of an encryption audio message using chaotic map in a noisy channel,” J. Commun., vol. 14, no. 2, pp. 142–147, 2019, doi: 10.12720/jcm.14.2.142-147.
[5] A. Kanso, M. Ghebleh, and M. B. Khuzam, “A Probabilistic Chaotic Image Encryption Scheme,” Mathematics, vol. 10, no. 11, Jun. 2022, doi: 10.3390/math10111910.
[6] A. H. Khaleel and I. Q. Abduljaleel, “Chaotic Image Cryptography Systems: A Review,” Samarra J. Pure Appl. Sci., vol. 3, no. 2, pp. 129–143, 2021, doi: 10.54153/sjpas.2021.v3i2.244.
[7] Q. Zhang, Y. Yan, Y. Lin, and Y. Li, “Image Security Retrieval Based on Chaotic Algorithm and Deep Learning,” IEEE Access, vol. 10, no. June, pp. 67210–67218, 2022, doi: 10.1109/ACCESS.2022.3185421.
[8] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach,” J. Imaging, vol. 8, no. 6, Jun. 2022, doi: 10.3390/jimaging8060167.
[9] S. Ahadpour and Y. Sadra, “A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices.”
[10] H. Liang, G. Zhang, W. Hou, P. Huang, B. Liu, and S. Li, “A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography,” Appl. Sci., vol. 11, no. 12, 2021, doi: 10.3390/app11125691.
[11] N. M. Turab, M. Abu-alhaija, H. A. Owida, and J. I. Al-nabulsi, “A Survey On Dna Cryptographic Techniques , Challenges And Future Trends,” vol. 19, no. 2, pp. 7178–7194, 2022.
[12] A. Abooee and M. R. Jahed-Motlagh, “Identical and nonidentical synchronization of hyperchaotic systems by active backstepping method,” Iran. J. Electr. Electron. Eng., vol. 8, no. 3, pp. 217–226, 2012.
[13] G. Grass and S. Mascolo, “Synchronizing hyperchaotic systems by observer design,” IEEE Trans. Circuits Syst. II Analog Digit. Signal Process., vol. 46, no. 4, pp. 478–483, 1999, doi: 10.1109/82.755422.
[14] T. Haibutsu, Y. Nishio, I. Sasase, and S. Mori, “A secret key cryptosystem by iterating a chaotic map,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1991, vol. 547 LNCS, pp. 127–140. doi: 10.1007/3-540-46416-6_11.
[15] Physical Review Letters, “C O N T R O L OF T H E L O R E N Z C H A O S BY T H E EXACT L I N E A R I Z A T I O N *,” 1990, [Online]. Available: Physical Review Letters
[16] A. Sabaghian, S. Balochian, and M. Yaghoobi, “Synchronisation of 6D hyper-chaotic system with unknown parameters in the presence of disturbance and parametric uncertainty with unknown bounds,” Conn. Sci., vol. 32, no. 4, pp. 362–383, 2020, doi: 10.1080/09540091.2020.1723491.
[17] H. Chen, EBay, X. Jiang, and Y. Wu, “A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System,” IEEE Access, vol. 10, pp. 116031–116044, 2022, doi: 10.1109/access.2022.3218668.
[18] J. Li and X. Di, “A New Hyperchaotic 4D-FDHN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption,” Entropy, vol. 24, no. 7, pp. 1–28, 2022, doi: 10.3390/e24070900.
[19] G. A. Gottwald and I. Melbourne, “The 0-1 test for chaos: A review,” Lect. Notes Phys., vol. 915, pp. 221–247, 2016, doi: 10.1007/978-3-662-48410-4_7.
[20] M. M. Maqableh, “Analysis and Design Security Primitives Based on Chaotic Systems for eCommerce,” p. 240, 2001.
[21] P. K. Rajan and H. C. Reddy, “On the Necessary Conditions for the BIBO Stability of n-D Filters,” IEEE Trans. Circuits Syst., vol. 33, no. 11, p. 1143, 1986, doi: 10.1109/TCS.1986.1085861.
[22] Zhouyi Hu; Chun-Kit Chan, “A 7-D Hyperchaotic System-Based Encryption Scheme for Secure Fast-OFDM-PON,” Light. Technol., 2018.
[23] X. Gao, J. Mou, S. Banerjee, Y. Cao, L. Xiong, and X. Chen, “An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 4, pp. 1535–1551, 2022, doi: 10.1016/j.jksuci.2022.01.017.
[24] F. Masood et al., “A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations,” Wirel. Pers. Commun., no. 0123456789, 2021, doi: 10.1007/s11277-021-08584-z.
[25] S. A. A. Mehdi and A. A. Kadhim, “Design and analysis of a novel five-dimensional hyper-chaotic system,” ICIC Express Letter. Part B Appl., vol. 11, no. 1, pp. 103–110, 2020, doi: 10.24507/icicelb.11.01.103.
[26] T. Nestor et al., “A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption,” Symmetry (Basel)., vol. 14, no. 2, pp. 1–23, 2022, doi: 10.3390/sym14020424.
[27] T. Gopalakrishnan and S. Ramakrishnan, “Image Encryption Using Hyper-chaotic Map for Permutation and Diffusion by Multiple Hyper-chaotic Maps,” Wirel. Pers. Commun., vol. 109, no. 1, pp. 437–454, 2019, doi: 10.1007/s11277-019-06573-x.
[28] A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” J. Supercomput., vol. 75, no. 10, pp. 6663–6682, Oct. 2019, doi: 10.1007/s11227-019-02878-7.
[29] L. Teng, X. Wang, F. Yang, and Y. Xian, “Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion,” Nonlinear Dyn., vol. 105, no. 2, pp. 1859–1876, 2021, doi: 10.1007/s11071-021-06663-1.
[30] J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic Lightweight Cryptosystem for Image Encryption,” Adv. Multimed., vol. 2021, 2021, doi: 10.1155/2021/5527295.
[31] B. H. Jasim, K. H. Hassan, and K. M. Omran, “A new 4-D hyperchaotic hidden attractor system: Its dynamics, coexisting attractors, synchronization and microcontroller implementation,” Int. J. Electr. Comput. Eng., vol. 11, no. 3, pp. 2068–2078, 2021, doi: 10.11591/ijece.v11i3.pp2068-2078.
[32] D. Baleanu, S. S. Sajjadi, J. H. Asad, A. Jajarmi, and E. Estiri, “Hyperchaotic behaviors, optimal control, and synchronization of a nonautonomous cardiac conduction system,” Adv. Differ. Equations, vol. 2021, no. 1, 2021, doi: 10.1186/s13662-021-03320-0.
[33] X. Gao, “Image encryption algorithm based on 2D hyperchaotic map,” Opt. Laser Technol., vol. 142, no. March, p. 107252, 2021, doi: 10.1016/j.optlastec.2021.107252.
[34] E. Al Solami, M. Ahmad, C. Volos, M. N. Doja, and M. M. Sufyan Beg, “A new hyperchaotic system-based design for efficient bijective substitution-boxes,” Entropy, vol. 20, no. 7, pp. 1–17, 2018, doi: 10.3390/e20070525.
[35] H. Saeed, H. E. Ahmed, T. O. Diab, H. L. Zayed, H. N. Zaky, and W. I. Elsobky, “Evaluation of the Most Suitable Hyperchaotic Map in S-Box Design Used in Image Encryption,” no. October, 2022.
[36]A. Alhudhaif, M. Ahmad, A. Alkhayyat, N. Tsafack, A. K. Farhan, and R. Ahmed, “Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System,” IEEE Access, vol. 9, pp. 87686–87696, 2021, doi: 10.1109/ACCESS.2021.3090163.
[37] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach,” J. Imaging, vol. 8, no. 6, 2022, doi: 10.3390/jimaging8060167.
[39] G. Chen and T. Ueta, “‘Yet another chaotic attractor,’” 1999, [Online]. Available: G. Chen and T. Ueta, “Yet another chaotic attractor,” Int. J. Bifurcation%0AChaos, vol. 9, no. 7, pp. 1465–1466, Jul. 1999
[40] Y. Hui and H. Liu, “A DNA image encryption based on a new hyperchaotic system,” 2021.
[41] B. Ge, G. Chen, X. Chen, and Z. Shen, “Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/2237525.
[42] K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, “New image encryption algorithm using hyperchaotic system and fibonacci q-matrix,” Electron., vol. 10, no. 9, 2021, doi: 10.3390/electronics10091066.
[43] J. Wang and L. Liu, “A Novel Chaos-Based Image Encryption Using Magic Square Scrambling and Octree Diffusing,” Mathematics, vol. 10, no. 3, 2022, doi: 10.3390/math10030457.
[44] C. Zhao, T. Wang, H. Wang, Q. Du, and C. Yin, “A Novel Image Encryption Algorithm by Delay Induced Hyper-chaotic Chen System,” J. Imaging Sci. Technol., vol. 0, no. 0, pp. 010501-1-010501-15, 2023, doi: 10.2352/j.imaging sci.technol.2023.67.1.010501.
[45] Y. Wu, J. P. Noonan, and S. Again, “NPCR and UACI Randomness Tests for Image Encryption,”
Cyberjournals. Com, no. April 2011, 2011, [Online]. Available:
http://www.cyberjournals. com/Papers/Apr2011/05.pd f
[46] Y. Hui, H. Liu, and P. Fang, “A DNA image encryption based on a new hyperchaotic system,” Multimed. Tools Appl., 2021, doi: 10.1007/s11042-021-10526-7.
[47] A. M. Awad, “Hybrid Image Encryption Algorithms based on Chaotic Theory,” 2016.