1. Arroyo, D., Alvarez, G., Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. X Reniun Espaola Sobre Criptologa y Seguirdad de la Informacin (XRECSI) 1, 77–82 (2008)
2. Bahi, J., Guyeux, C.: A new chaos-based watermarking algorithm. In: SECRYPT 2010, International conference on security and cryptography, Athens, Greece, pp.35-40 (to appear, 2010)
3. Bahi, J.M., Guyeux, C.: Chaotic iterations and topological chaos. arXiv 0810.3154 (2008)
4. Cayre, F., Bas, P.: Kerckhoffs-based embedding security classes for woa data hiding. IEEE Transactions on Information Forensics and Security 3(1), 1–15 (2008)
5. Cecen, S., Demirer, R.M., Bayrak, C.: A new hybrid nonlinear congruential number generator based on higher functional power of logistic maps. Chaos, Solitons and Fractals 42, 847–853 (2009)