Figures
Abstract
The Arnold Cat Map (ACM) is a popular chaotic map used in image encryption. Chaotic maps are known for their sensitivity to initial conditions and their ability to permute, or rearrange, pixels. However, ACM is periodic, and its period is relatively short. This periodicity decreases the effective key-space and security of a cryptosystem using ACM. Further, ACM is typically only able to be performed on square images. To solve the low periodicity and typical limitation to square images, this paper proposes performing ACM on overlapping square partitions which cover the entirety of an image. The presence of overlap results in a greatly increased image period. The resulting system will be referred to as overlapping ACM or OACM. Several papers have already discussed systems involving overlapping ACM. However, they did not discuss the implementation or periodicity of such a system in detail. This paper does cover the implementation and periodicity analysis of OACM and proposes a simple symmetric encryption system which uses OACM. The proposed encryption system is not as sophisticated or secure as other modern encryption schemes, since it is mainly intended as an initial test of OACM’s utility. Histogram and sensitivity analyses did however indicate a level of security against various cryptographic attacks, and OACM performed reasonably in both the permutation and diffusion stages of the cryptosystem.
Citation: O’Dea A (2024) ACM and rectangular images: Overlapping partitions, implementation, and periodicity analysis. PLoS ONE 19(8): e0303589. https://doi.org/10.1371/journal.pone.0303589
Editor: Je Sen Teh, Deakin University, AUSTRALIA
Received: May 30, 2023; Accepted: April 28, 2024; Published: August 12, 2024
Copyright: © 2024 Anthony O’Dea. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: The author received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
Introduction
With a rise in the use of cloud storage, electronic communications, and electronic health records, image encryption as a means to protect privacy is more important than ever. Without modification, traditional encryption techniques are not adequate for image encryption. This difficulty principally arises from normal images’ bulk data capacity and the high correlation between adjacent pixel values. Regardless, strong image encryption techniques rely on the same framework of frustrating statistical analysis as traditional techniques. This framework being diffusion and confusion, which was described by Claude Shannon in 1945 [1].
Diffusion refers to the dissipation of meaningful statistical patterns within the plaintext during the encryption process. This means that any statistical patterns present within the ciphertext should not be relevant to the plaintext. For image encryption, this typically means that the probability of any given color value at a position should appear to be random. For cipher images that fulfill this property of diffusion, their color value histograms will be flat, and there should be no correlation between the color values of adjacent pixels. Diffusion also refers to the sensitivity of the ciphertext to changes in the plaintext. Confusion refers to the relationship between the key and the ciphertext, which should be a very complex relationship such that any given value in the ciphertext depends on multiple parameters from the key.
A high sensitivity to the plain image can be achieved by generating a hash from the image, using algorithms such as MD5 and SHA 256 [2, 3]. The hash value is then used to generate parameters for the encryption process. In other words, the hash algorithm generates an image specific key. This is typically used in addition to a user-specified/fixed key. Both of these keys must be known for decryption. The dependency of the ciphertext on the plaintext as a result of these hash parameters increases a cryptosystem’s resistance towards known and chosen plaintext attacks [3].
A common image encryption architecture is permutation-diffusion, which is a two stage process of permutation followed by diffusion [4]. Permutation typically refers to the rearrangement or shuffling of pixels within an image. Permutation can also refer to the rearrangement of bits [5–11]. The permutation phase in permutation-diffusion is often associated with chaotic maps, but can also be performed with scan patterns, jigsaw transform, and other methods [12, 13]. During the diffusion stage, the color values are changed, and the diffusion principle of encryption is more fully achieved. Note that an encryption scheme that only involves permutation will always be weak to plaintext attacks [14].
The Arnold cat map is an area preserving linear transformation which is commonly used in image encryption schemes. ACM is one of several chaotic maps used in image encryption [15]. ACM is mainly used to rearrange an image’s pixels such that after some number of iterations, the resulting image will appear to have been shuffled randomly. ACM can also be used to alter an image’s color values. ACM in matrix form is:
(1)
[A] is shorthand for the ACM matrix. x’ and y’ indicate the new location of the pixel formerly at x and y. N is the side length in pixels of a square image. This paper will use the terms width and height to refer to the horizontal and vertical lengths of non-square images when necessary. For decryption, the inverse of the ACM matrix can be used to move pixels back to their original state.
The standard ACM transformation can be visualized in Fig 1.
The ACM matrix stretches the image while retaining the number of pixels, and the modulo operation cuts the stretched image into pieces and places these pieces back into the image bounds.
ACM is periodic, which means that after some number of iterations, the system will return to its original state. The period, P(N), is a function of N and certain relations have been found between N and P(N):
With k as positive integers. The period never exceeds 3N [16]. For common image sizes, the period is considerably smaller than this maximum, as shown in Table 1.
Periodicity limits the effective key-space and increases susceptibility of the cryptosystem to brute force attacks. Cryptosystems involving chaotic maps with weak key-spaces have been broken before [17].
A pixel within an image undergoing ACM has its own period, which is the minimum number of iterations before returning to its original location. The path a pixel takes during these iterations is referred to as its orbit. All of the pixels along the same orbit have the same period, which is equal to the number of pixels in that orbit. The (0, 0) pixel does not move, so it has a period of 1. The overall P(N) of an image will be the least common multiple of the individual pixel periods. Excluding the origin’s orbit, orbits in images with prime N (except for N = 5) will all have the same length [18].
At certain iterations of ACM before P(N), the original image may reappear in some manner [19]. This effect may be seen in Fig 2. These iterations will be referred to as ghost periods and typically are simple fractions of P(N). Although not typically discussed, these ghost periods do decrease the security of ACM. The typical randomization process across iterations is shown in Fig 3 for comparison.
The original image is somewhat evident at P(256)/2 iterations.
The image is still somewhat recognizable after one iteration, but is more like noise after only ten iterations.
Implementing ACM
To implement ACM programmatically, Eq 1 may be rewritten as:
(2)
ACM is performed some number of iterations, Z, on an image during the encryption process. Rather than repeatedly performing ACM Z times, all of those iterations can be replaced with a single operation. This can be done in several ways. Multiple iterations of Arnold cat map may be represented via:
(3)
Where [A]Z is simply the ACM matrix raised to the power Z. However, the values in [A]Z can quickly become large enough to cause numerical errors, unless otherwise accounted for. To avoid these large values, [A]Z can be replaced with AZ, which can be found with the following iterative sequence:
(4)
The orbits of the ACM operation can also be used to jump directly to any given iteration. Let’s define an orbit as a list of n pixels with indices from 0 to n—1. A single iteration of ACM will result in a rightward shift along this list by 1 index, with the rightmost pixel moving to index 0. With i(p) as the index of pixel p, the location of a pixel after Z iterations can be represented as:
(5)
Permuting every pixel in every orbit according to this operation will result in the same image as performing ACM Z times. Like the above methods, as Z gets larger, it will take considerably less time than performing each ACM operation individually. This orbit based permutation method will work for permutations besides ACM as well.
Modifications to ACM
Several modifications to ACM have been proposed in literature. These modifications are primarily used to increase the key-space and the period. The simplest of these modifications involve replacing elements of the matrix with integer variables. ACM can also be extended to 3D [20, 21]. Nonlinear perturbations can also be added to ACM, which can considerably increase the period [22]. Linear displacements can also be added onto ACM to change the effective origin coordinate [23].
One of the common generalization of ACM is:
(6)
Where P and Q are integers ranging from 0 to N—1. The values of P and Q can impact the period, and this system has been studied thoroughly [24, 25]. The determinant will always be 1 for this matrix, so the transformation is area preserving. A matrix will be area preserving if its determinant is ±1. This property of area preservation is a commonly mentioned feature of ACM and its extensions [18, 21, 26]. However, this is not actually necessary for a transformation and modulo operation to be usable for image encryption. What matters is that the operation is invertible, as in it can be reversed. When a matrix transformation and modulo operation is not invertible, what occurs is that 2 or more points from the plain image are mapped to the same location in the cipher image. This destroys information, and prevents the operation from being reversed. The transformation and modulo operation of a square image will be invertible if gcd(det[A], N) = 1 [27]. This will always be true for area preserving matrices, but also allows for matrices with determinants besides ±1.
A number of papers discuss transformation matrices where every matrix element is a variable [26, 27]. Importantly, such a system has been described as able to work on non-square images when a specific set of conditions are met [28, 29]. This operation is called the 2D rectangular transform and is defined as 7:
(7)
The modulo operation has been modified to account for when the height and width are different from each other. More critically, is the understanding of when this operation can be performed reversibly on non-square images. This is possible when 8:
(8)
So under those conditions, ACM and other transformation matrices can be used to successfully encrypt and decrypt non-square images. This is very important, but is under-discussed in literature.
As opposed to a modification to the actual ACM operation, like above, this paper will propose and analyze a means of applying ACM to an image. This application method bypasses the above image size constraints and has much greater periodicity than traditional ACM.
Overlapping ACM
Previous works have discussed the use of overlapping partitions for ACM and other techniques, but they did not focus on the periodicity or implementation of such systems [30–33]. Overlapping partitions can extend ACM to non-square images and will also greatly increase the overall image period. This paper proposes a means of performing ACM on overlapping square blocks in a pattern similar to a regular grid. While this will limit the possible number of permutations
There are several key parameters to this problem: image height and width, square size, amount of overlap, and number of squares. The number of squares is determined by the other parameters and can not be directly set within the proposed method detailed below.
The method begins by producing a list of x and y coordinates for the upper left corner of each square, based on the given parameters. The respective tiling will be made with the least number of squares possible. The specified amount of overlap must be broken in cases where the overlapping squares would not otherwise properly cover the entire image. The overlap in these cases will be referred to as geometric overlap, as opposed to specified overlap. The coordinates are found via Algorithm 1.
Algorithm 1 Square Locations
for y from 0 to image height—square size—1 by 1’s
if (y-1) Mod (square size—overlap) = 0
add y to y list
end
end
add height-squareSize to y list
for x from 0 to image width—square size—1 by 1’s
if (x-1) Mod (square size—overlap) = 0
add x to x list
end
end
add width-squareSize to x list
ACM is then performed in order on each square specified by those two lists. The set of those ACM operations make up a single operation of OACM. Decryption is performed via inverse ACM on each square in the reverse order.
The total number of possible tilings which can be produced by algorithm 1 is limited by the smallest image dimension. The square partition size can range from 2 to the limiting dimension. Overlap can range from 1 to square size minus 1. Overlap must also be ≥ 2*square size—limiting dimension. A specified overlap which breaks that rule will be forced to equal a geometric overlap. Table 2 suggests a second order relationship with the limiting dimension, N.
Fig 4 portrays a simple OACM system with 4 squares overlaying a rectangular image. The geometric overlap is larger than the specified overlap, which will always be true for systems that require geometric overlap. A smaller overlap would extend the squares past the bounds of the image. Fig 5 also helps visualize how OACM works.
Permuted once by OACM with square size as 200 and overlap as 100.
Implementing overlapping ACM
Unlike ACM, multiple iterations of overlapping ACM (OACM) can not be performed with a single matrix multiplication. However, Eq 5 is still applicable and can be used to greatly decrease computation time. The orbits used in the implementation of Eq 5 can all be calculated from a single operation of OACM.
An index matrix is a matrix where the value at an index is equal to the index. OACM is performed on an index matrix. Now, at any given index is a value representing the index of a pixel that is moving along the same orbit as the original index. Moving to that second indexes’ position within the permuted index matrix yields another pixel in the same orbit, and so on. Figs 6 and 7 represent a small example using the above technique.
The colors represent pixels within the same orbit.
Pixel 30 is stationary, in addition to the origin. These orbits can then be used to calculate the location of a pixel after any number of iterations. The lengths of the orbits can also be used to quickly determine the period of the system.
Periodicity analysis
A limiting/simplifying case of OACM is when a rectangle is to be tiled by the minimum number of squares with size equalling the image height. For rectangles with aspect ratio W:H between 1:1 and 2:1, this tiling is simply one square on the leftmost and rightmost sides. For squares, a simplifying case would be a tiling with four squares in each corner with edge lengths > half the image size.
Tables 3 and 4 indicate the overall period for simplified rectangular and square OACM systems respectively. The periods within these tables were found as the least common multiple of the orbit lengths.
The large increases in image periodicity compared to regular ACM are a direct result of increases in the lengths of orbits and the number of unique orbit lengths. The orbit length distributions of normal ACM and two OACM systems are shown in Fig 8. Note that certain combinations of square size and overlap can result in very long orbit lengths. This limits the effective period to the length of that orbit. This effective period will be referred to as a ghost period, even though it is somewhat different from regular ACM’s ghost periods.
From top to bottom, regular ACM, OACM with 4 squares of size 384, and OACM with squares of size 100 and an overlap of 25.
Similarity graphs like those in Fig 9 can also be used to detect ghost periods. Similarity graphs represent the number or percentage of pixels back in their original location vs the number of iterations. Noticeable peaks in these graphs will occur when multiple orbits return to their original state at the same time or when an orbit of sufficient length returns to its original state. The impact this can have on an image is shown in Fig 10. Unless accounted for, these ghost periods will decrease the effective key-space and security of a system which uses OACM.
From top to bottom, regular ACM, OACM with 4 squares of size 384, OACM with squares of size 100 and an overlap of 25. Note the presence of peaks around 50% similarity in the bottom graph, which comes from a single large orbit of length 119657.
The singular orbit of length 119657 having returned to its original state makes the image easily recognizable.
Given that OACM provides some level of control over the orbit lengths, what set of these lengths will yield the maximum possible image period? A similar question was posed by Edmund Landau around the start of the 20th century [34]: what partitions of n elements will provide the maximal order? The LCM of the lengths of the partitions is the order, and would also be maximized. The “Landau series,” s(n), for n elements will be a set of partition lengths which provide maximal order. There may be multiple s(n) for the same n. The Landau function, g(n), provides the order for s(n). Note that the Landau function is not a singular complete function, and there are several existing methods for finding g(n) with varying speeds and ranges of accuracy [35, 36]. The prime factorization of g(n) may be used to find s(n) where any recurring primes within the prime factor list are replaced by their product.
The values of g(n), with n as the number of pixels, provide an upper bound for OACM’s and similar systems’ periodicity. For example, a 512 by 512 image with Landau sized partitions would have a period of g(262144), equalling 4.3 * 10826. Note the much smaller OACM period values in Tables 3 and 4.
Proposed encryption scheme
This paper proposes using OACM in the scheme shown in Fig 11. The set parameters are used to determine the OACM permutation performed on the plain image. Hash parameters derived from the SHA 256 hash of the plain image will be used to permute an index matrix with the same dimensions as the plain image. The permuted index matrix is then XORed with the permuted plain image to yield the cipher image. Decryption will involve performing the XOR operation again, and then performing reverse OACM on the resulting matrix to yield the plain image. The individual ACM operations used in this process will be the common two parameter extension of ACM. This adds P and Q as parameters. Size, overlap, and the number of iterations will be the other parameters.
This is a pared down permutation-diffusion scheme. Typically, there would be multiple rounds of these operations.
Hash key
The SHA 256 hash provides 256 bits from which the hash parameters can be derived. Fractions FS, FP, FQ, and FO are each generated from the XOR of 4 sets of 10 bits from the hash. The resulting binary sequence from each XOR operation is converted to an integer between 0 and 1023, and then converted to a fraction between 0 and 1. These fractions are used to generate values for square size, P, Q, and overlap. This parameter scheme considerably under-utilizes the 256 bit hash. For Eq 9, length refers to the smaller image dimension and limit will account for the geometric constraints placed on overlap.
(9)
Results
This section focuses on the encryption of a 384 by 256 rabbit image. The parameters for its encryption are shown in Table 5. As shown in the table, a single bit change in the plain image can result in a considerable change to the hash parameters. Sensitivity towards the plain image helps protect against differential attacks.
The origin coordinate of the plain image was increased by 1 before the image was run through SHA 256 again to determine the Bit-Off hash parameters.
The level of randomness in the cipher image can be seen quite clearly in Fig 12. The cipher image histogram is uniform, which prevents any useful information about the plain image from being obtained. Note that the change in the image’s histogram comes solely from the XOR operation during diffusion. The permutation does not change the histogram.
The correlation between adjacent pixels is expected to greatly decrease upon encryption. This can be visualized with correlation plots as in Fig 13 or quantified with correlation coefficients as in Table 6. The horizontal and vertical correlation coefficients for the cipher images are all around zero, while the plain image coefficients are closer to one. This lack of correlation also indicates resistance against statistical attacks.
NPCR and UACI given a single bit change in the plain image.
Table 6 also includes the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) when there is a single bit change in the plain image. NPCR and UACI are often used to evaluate the sensitivity of a cryptosystem to changes of specific parameters and the plain image. Sensitivity to the plain image indicates security against differential attacks. NPCR compares two images of the same size and represents the rate at which two pixels in the same location have different values. The images may be two different cipher images with a small change to the key. They could also be the plain image vs an attempted decryption with a slightly incorrect key. UACI is similar, but it accounts for the amount of difference between two pixels in the same location. UACI is typically just used for measuring plain text sensitivity, and not general parameter sensitivity as well like NPCR. For 8 bit grey images, like the ones used in this paper, the expected values of NPCR and UACI for secure encryption techniques are 0.9961 and 0.3346 respectively [37]. NPCR and UACI are calculated from Eq 10.
(10a)
(10b)
The NPCR and UACI values in Table 6 show ideal sensitivity to the plain image. What those values indicate specifically is the sensitivity of the cryptosystem to changes in all 5 hash parameters at the same time, as a result of a single bit change in the plain image. This can obscure if the system is insufficiently sensitive to any one parameter from the set of hash parameters. Table 7 includes the NPCR for small individual changes to all parameters for both encryption and decryption. The NPCR for a change to the hash iteration count was the weakest, and should not be considered secure.
Conclusion
CO2 OACM allows for the encryption of non-square images and has much higher periods than regular ACM. Ghost periods for OACM can greatly decrease the security of certain keys by limiting the effective iteration space. The overall image period for OACM is typically quite large, but is considerably smaller compared to the maximal order provided by the Landau function. The proposed simple cryptosystem indicates that OACM can perform decently as a tool in both permutation and diffusion. The histograms, NPCR, UACI, and correlation coefficients generally indicated resistance of the proposed cryptosystem to differential and statistical attacks. However, the sensitivity of the cryptosystem towards certain diffusion parameters such as the iteration count was too low to be considered secure.
Future related work may involve extending OACM to 3D, using partitions which wrap around an image’s boundaries, and using the 2D rectangular transform instead of ACM. Developing encryption techniques based on the Landau series is also of interest for future work.
References
- 1. Shannon CE. Communication theory of secrecy systems. The Bell System Technical Journal. 1949;28(4):656–715.
- 2. Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools and Applications 76. 2017.
- 3. Chai X, Zhang J, Gan Z, Zhang Y. Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimedia Tools and Applications 78. 2019.
- 4. Fridrich J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos. 1998;8:1259–1284.
- 5. Chai X. An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools and Applications. 2017;76:1159–1175.
- 6. Fu C, bin Lin B, sheng Miao Y, Liu X, jie Chen J. A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications. 2011;284(23):5415–5423.
- 7. Liu H, Wang X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications. 2011;284(16):3895–3903.
- 8. Zhang Y, Xiao D. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Communications in Nonlinear Science and Numerical Simulation. 2014;19(1):74–82.
- 9. Zhang YQ, Wang XY. A new image encryption algorithm based on non-adjacent coupled map lattices. Applied Soft Computing. 2015;26:10–20.
- 10. Zhang W, Yu H, li Zhao Y, liang Zhu Z. Image encryption based on three-dimensional bit matrix permutation. Signal Processing. 2016;118:36–50.
- 11. liang Zhu Z, Zhang W, wo Wong K, Yu H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences. 2011;181(6):1171–1186.
- 12. Bourbakis N, Alexopoulos C. Picture data encryption using scan patterns. Pattern Recognition. 1992;25(6):567–581.
- 13. Kumar P, Joseph J, Singh K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl Opt. 2011;50(13):1805–1811. pmid:21532655
- 14. Zhang LY, Liu Y, Wang C, Zhou J, Zhang Y, Chen G. Improved known-plaintext attack to permutation-only multimedia ciphers. Information Sciences. 2018;430-431:228–239.
- 15. B Zhang LL. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics. 2023.
- 16. J DF, H F. Period of a discrete cat mapping. The American Mathematical Monthly. 1992;99(7):605–614.
- 17. Hanouti IE, Fadili HE, Zenkouar K. Breaking an image encryption scheme based on Arnold map and Lucas series. Multimedia Tools and Applications. 2021;80:4975–4997.
- 18.
Svanström F. Properties of a generalized Arnold’s discrete cat map; 2014.
- 19. Behrends E. The ghosts of the cat. Ergodic Theory and Dynamical Systems. 1998;18(18):321–330.
- 20. Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals. 2004;21(3):749–761.
- 21.
Fransson L. Tribonacci Cat Map: A discrete chaotic mapping with Tribonacci matrix; 2021.Available from: https://api.semanticscholar.org/CorpusID:264126048.
- 22. Hermann D, Gildas GG, Fouda JSAE, Koepf W. On the implementation of large period piece-wise linear Arnold cat map. Multimedia Tools and Applications. 2022;81.
- 23. Wu J, Wang J, Hu L. A compact image encryption system based on Arnold transformation. Multimedia Tools and Applications 80. 2021; p. 2647–2661.
- 24. Li C, Tan K, Feng B, Lü J. The Graph Structure of the Generalized Discrete Arnold’s Cat Map. IEEE Transactions on Computers. 2022;71(2):364–377.
- 25. Chen F, wo Wong K, Liao X, Xiang T. Period distribution of generalized discrete Arnold cat map. Theoretical Computer Science. 2014;552:13–25.
- 26. Tora H, Gokcay E, Turan M, Buker M. A generalized Arnold’s Cat Map transformation for image scrambling. Multimedia Tools and Applications. 2022;81:31349–31362.
- 27. Turan M, Gökçay E, Tora H. An unrestricted Arnold’s cat map transformation. Multimedia Tools and Applications. 2024.
- 28. Shao L, Qin Z, Liu B, Gao H, Qin J. 2D bi-scale rectangular mapping and its application in image scrambling. J Comput Aided Des Comput Graph. 2009;21(7):1025–1034.
- 29. Zhang X, Fan X, Wang J, Zhao Z. A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution. Multimedia Tools and Applications. 2016;75:1745–1763.
- 30. Tang Z, Wang F, Zhang X. Image encryption based on random projection partition and chaotic system. Multimedia Tools and Applications. 2017;76:8257–8283.
- 31. Tang Z, Yang Y, Shijie X, Yu C, Zhang X. Image Encryption with Double Spiral Scans and Chaotic Maps. Security and Communication Networks. 2019; p. 1–15.
- 32. Tang Z, Zhang X. Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies. Journal of Multimedia. 2011;6:202–206.
- 33. Tang Z, Zhang X, Lan W. Efficient image encryption with block shuffling and chaotic map. Multimedia Tools and Applications. 2015;74:5429–5448.
- 34.
Beasley BD. From Perfect Shuffles to Landau’s Function. ACMS Conference Proceedings 2019. 2019;.
- 35.
Gunter R. Estimating Landau’s Function [Bachelor’s Thesis]. University of California, Davis; 2020. Available from: https://www.math.ucdavis.edu/~tdenena/undergrad_thesis/202003_Richard_Gunter_Simental.pdf.
- 36. Deléglise M, Nicolas JL, Zimmermann P. Landau’s function for one million billions. Journal de théorie des nombres de Bordeaux. 2008;20(3):625–671.
- 37. Zhu C. A novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications. 2012;285(1):29–37.