[1] Y. Song, Z. Zhu, W. Zhang, H. Yu and Y. Zhao, “Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture,” in IEEE Access, vol. 7, pp. 84386-84400, 2019, doi: 10.1109/ACCESS.2019.2923018. [2] A Kadhim , “Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers”, - Diyala Journal For Pure Science, vol. 13, no. 3-part 2, pp. 24-39, 2017. [3] H. Natiq, “A new hyper chaotic map and its application for image encryption”, Eur. Phys. J. Plus 133, 6, 2018. https://doi.org/10.1140/epjp/i2018-11834-2. [4] F. Alaa Kadhim, G. H. Abdul-Majeed and R. S. Ali, "Enhancement CAST block algorithm to encrypt big data," 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, 2017, pp. 80-85, doi: 10.1109/NTICT.2017.7976119. [5] M. Benssalah, Y. Rhaskali and M. S. Azzaz, "Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory," 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), El Oued, 2018, pp. 222-226, doi10.1109/SaCoNeT.2018.8585512. [6] A. K. Farhan and M. A. A. Ali, "Database protection system depend on modified hash function", Proc. Conf. Cihan Univ.-Erbil Commun. Eng. Compute. Sci., pp. 1-101, Mar. 2017. [7] X. Liu, D. Xiao, W. Huang and C. Liu, "Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model," in IEEE Access, vol. 7, pp. 57188-57199, 2019. doi: 10.1109/ACCESS.2019.2914184. [8] A. Kadhim, S. Khalaf, ”New Approach for Security Chatting in Real Time”, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS),vol. 4, no.3, 2015. [9] T. K. Hazra and S. Bhattacharyya, "Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2016, pp. 1-6, doi: 10.1109/IEMCON.2016.7746312 [10] X. Wang, S. Gao, L. Yu, Y. Sun and H. Sun, "Chaotic Image Encryption Algorithm Based on Bit-Combination Scrambling in Decimal System and Dynamic Diffusion," in IEEE Access, vol. 7, pp. 103662-103677, 2019, doi: 10.1109/ACCESS.2019.2931052. [11] Z. Wu, X. Zhang and X. Zhong, "Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption," in IEEE Access, vol. 7, pp. 37989-38008, 2019, doi: 10.1109/ACCESS.2019.2906770. [12] M. I. Wade, M. Chouikha, T. Gill, W. Patterson, T. M. Washington and J. Zeng, "Distributed Image Encryption Based On a Homomorphic Cryptographic Approach," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 2019, pp. 0686-0696, doi: 10.1109/UEMCON47517.2019.8993025. [13] A. U. Rehman, H. Wang, M. M. Ali Shahid, S. Iqbal, Z. Abbas and A. Firdous, "A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512," in IEEE Access, vol. 7, pp. 162786-162802, 2019, doi: 10.1109/ACCESS.2019.2951749 [14] R. Das, S. Manna and S. Dutta, "Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme," 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, 2017, pp. 748-753, doi: 10.1109/ICPCSI.2017.8391813. [15] M. K. Abdmouleh, A. Khalfallah and M. S. Bouhlel, "A Novel Selective Encryption DWT-Based Algorithm for Medical Images," 2017 14th International Conference on Computer Graphics, Imaging and Visualization, Marrakesh, 2017, pp. 79-84, doi: 10.1109/CGiV.2017.10. [16] X. Geng and Q. Ding, "Similar-short Periodicity Analysis and Application in Image Compression Encryption of Digital Chaos," 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, 2012, pp. 167-171, doi: 10.1109/IWCFTA.2012.44. [17] Wenting Yuan, Xuelin Yang, Wei Guo and Weisheng Hu, "A double-domain image encryption using hyper chaos," 2017 19th International Conference on Transparent Optical Networks (ICTON), Girona, 2017, pp. 1-4, doi: 10.1109/ICTON.2017.8025092. [18] Y. Luo, M. Du and D. Liu, "JPEG Image Encryption Algorithm Based on Spatiotemporal Chaos," 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, 2012, pp. 191-195, doi: 10.1109/IWCFTA.2012.49.