1. Anuradha, K., & Naik, P. P. S. (2015). Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. International Journal and Magazine of Engineering, Technology, Management and Research, 2, 100–105.
http://www.ijmetmr.com/oloctober2015/KolakaluriAnuradha-PPeddaSadhuNaik-13.pdf
.
2. Bansal, R., Gupta, S., & Sharma, G. (2016). An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimedia Tools and Applications.
https://doi.org/10.1007/s11042-016-3926-9
.
3. Baptista, M. S. (1998). Cryptography with chaos. Physics Letters A, 240, 50–54.
http://cmup.fc.up.pt/cmup/murilo.baptista/baptista_PLA1998.pdf
.
4. Barker, W. C., & Barker, E. (2012). Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology. Special Publication, 800–867.
http://dx.doi.org/10.6028/NIST.SP.800-67r1
5. Basu, S. (2011). International data encryption algorithm (IDEA)—A typical illustration. Journal of Global Research in Computer Science, 2, 116–118.
http://www.rroij.com/open-access/international-data-encryption-algorithm-idea-a-typical-illustration-116-118.pdf
.