1. Öztürk I, Sogukpınar I (2004) “Analysis and comparison of image encryption algorithms”; Transactions on engineering. Comput Tech 3:1305–1313
2. Potdar V, Chang E (2004) Disguising text cryptography using image cryptography. In 4th international network conference INC, July 6–9, University of Plymouth, UK
3. Mitra A, S Rao Y, Prasanna S (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):1306–4428
4. Socek D, Li S, Magliveras S, Furht B (2005) Enhanced 1-D chaotic key-based algorithm for image encryption. IEEE/CreateNet Secure Commun 2005:406–408
5. Shuangyuan Y, Zhengding L, Shuihua H (2004) An asymmetric image encryption based on matrix transformation. Communications and Information Technology. In IEEE international symposium on, ISCIT2004, vol 1, pp 66–69