[1] C. Roberta, G. Werner,E. Fernando, “SWOT: Google Device Technologies, Worldwide,” (https://www.gartner.com/doc/3896269?ref=mrktg-srch, accessed December 2018) [2] C. Pak and L. Huang, “A New Color Image Encryption using Combination of the 1D Chaotic Map,”Signal Processing, Vol. 138, pp. 129-137, 2017 [3] M. J. Rostami, A. Shahba, S. Saryazdi,H. Nezamabadi-pour, “A Novel Parallel Image Encryption with Chaotic Windows based on Logistic Map,”Computers and Electrical Engineering, Vol. 62, pp. 384-400, 2017 [4] V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, “Modified Substitution Diffusion Image Cipher using Chaotic Standard and Logistic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 10, pp. 2755-3-2765, 2010 [5] S. Tayde and S. Siledar, “File Encryption, Decryption using AES Algorithm in Android Phone,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, No. 5, pp. 550-554, 2015 [6] W. T. Zheng, “Image Encryption Research based on Android Phones,” Central China Normal University, 2016 [7] Y. H. Zhao, “Image Encryption APP Design and Implementation on the Android Platform,” Chongqing Normal University, 2016 [8] Z. Jiang, “Color Image Encryption based on Chaotic Mapping Cat Android,” Industrial Control Computer, Vol. 30, No. 4, pp. 98-100, 2017 [9] Q. C. Zhong, Q. X. Zhu,P. L. Zhang, “Multiple Chaotic Maps Encryption System,” Journal of University of Electronic Science and Technology of China, Vol. 38, No. 2, pp. 274-277, 2009 [10] C. X. Zhu, D. Z. Huang,Y. Guo, “A New Image Encryption Algorithm based on Multiple Chaotic Maps and Output-Feedback,” Geomatics and Information Science of Wuhan University, Vol. 35, No. 5, pp. 528-531, 2010 [11] G. Jiao, X. Peng,K. Duan, “Image Encryption with The Cross Diffusion of Two Chaotic Maps,” KSII Transactions on Internet and Information Systems, Vol. 13, No. 2, pp. 1064-1079, February 2019 [12] H. Lai, M. A. Orgun, J. Pieprzyk, J. Li, M. X. Luo, J. H. Xiao, et al., “High-Capacity Quantum Key Distribution using Chebyshev Map Values Corresponding to Lucas Numbers Coding,” Quantum Information Processing, Vol. 15, No. 11, pp. 4663-4679, 2016 [13] J. M. Liu, S. S. Qiu, F. Xiang,H. J. Xiao, “Information Encryption Algorithm based on Multiple Chaotic Mappings,”Journal of South China University of Technology (Natural Science Edition), No. 5, pp. 1-5, 2007 [14] Z. G. Huang, “Watermarking Algorithm based on Best Permutation,” Communications Technology, Vol. 43, No. 3, pp. 150-152, 2010 [15] W. Wang and C. Jin, “Image Encryption Scheme for Android Mobile Platform,” Computer Science, Vol. 41, No. 8, pp. 94-96, 2014 [16] B. B. Du, “Research and Implementation of an Image Encryption System based on Android,” Wuhan University of Technology, 2013 |