[1] ZHANG H Z, YAO M, LEI P, et al. Research of image processing method of far-field laser spots[J]. Laser Technology, 2013, 37(4):460-463(in Chinese).
[2] LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform[J]. Laser Technology, 2012, 36(1):50-53(in Chinese).
[3] PENG C, LIU L. Encryption algorithm for compressed images based on chaotic sequences[J]. Computer Engineering, 2008, 34(20):177-179(in Chinese).
[4] GU G S, LIU F C. Contourlet domain image encryption based on chaos mapping[J]. Journal of Computer Applications, 2011, 31(3):771-773(in Chinese).
[5] YANG H Q, LIAO X F, WONG K W, et al. SPIHT-based joint image compression and encryption[J]. Acta Physica Sinica, 2012, 61(4):40505(in Chinese).
[6] LIN C, WANG J P, MA W G, et al. Study on chaotic encryption algorithm for images after compression[J]. Microelectronics Computer, 2013, 30(3):5-7(in Chinese).
[7] CONG S, PU Y K, WANG J N. DCT based image compression algorithm and application[J]. Computer Engineering and Applications, 2010, 46(18):160-163(in Chinese).
[8] LI L, WANG W N, LI J J. Security improvement for image encryption algorithm based on hyper-chaos system[J]. Application Research of Computers, 2011, 28(11):4335-4337(in Chinese).
[9] LU H B, SUN Y. Image encryption scheme based on novel hyperchaotic system[J].Computer Science,2011,38(6):149-152(in Chinese).
[10] RAHIMOV H, BABAEI M, HASSANABADI H .Improving middle square method RNG using chaotic map[J]. Applied Mathematics, 2011, 2(4):137-141.
[11] SADEG S, GOUGACHE M, MANSOURI N, et al. An encryption algorithm inspired from DNA[C]// 2010 International Conference on Machine and Web Intelligence (ICMWI).New York, USA:IEEE, 2010:344-349.
[12] WANG Y, WONG K W, LIAO X, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing, 2011, 11(1):514-522.