1. http://www.imageprocessingplace.com/root_files_V3/image_databases.htm
2. Abdelrahman, A.A., Fouad, M.M., Dahshan, H., Mousa, A.M.: High performance CUDA AES implementation: a quantitative performance analysis approach. In: 2017 Computing Conference, pp. 1077–1085, July 2017. https://doi.org/10.1109/SAI.2017.8252225
3. Abdelrahman, A.A., Fouad, M.M., Dahshan, H.: Analysis on the AES implementation with various granularities on different GPU architectures. Adv. Electr. Electron. Eng. 15(3), 526–535 (2017). https://doi.org/10.15598/aeee.v15i3.2324
4. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(08), 2129–2151 (2006). https://doi.org/10.1142/S0218127406015970
5. Bassham, L.E., Rukhin, A.L., Nechvatal, J.S.J.R., Smid, M.E., Leigh, S.D., Levenson, M., Vangeland, M., Heckert, N.A., Banks, D.L.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report 800-22 Rev 1a, National Institute of Standards and Technology (NIST, Gaithersburg, MD, USA (2010)