Addabbo T, Fort A, Rocchi S, Vignoli V (2009) Chaos based generation of true random bits. Springer, Berlin, pp 355–377
MATH
Google Scholar
Android image format. https://developer.android.com/reference/android/graphics/ImageFormat.html
Android distribution dashboard (2018), https://developer.android.com/about/dashboards/
Aksoy S, Haralick RM (2001) Feature normalization and likelihood-based similarity measures for image retrieval. Pattern Recogn Lett 22(5):563–582. https://doi.org/10.1016/S0167-8655(00)00112-4. http://www.sciencedirect.com/science/article/pii/S0167865500001124. Image/Video Indexing and Retrieval
Article
MATH
Google Scholar
Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6022-5
Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., National Institute of Standards and Technology. https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic
Bouda J, Krhovjak J, Matyas V, Svenda P (2009) Towards true random number generation in mobile environments. In: Jøsang A, Maseng T, Knapskog SJ (eds) Identity and privacy in the internet age. Springer, Berlin, pp 179–189
Brown RG (2018) dieharder. http://webhome.phy.duke.edu/rgb/General/dieharder.php
Carter J, Wegman MN (1979) Universal classes of hash functions. J Comput Syst Sci 18(2):143–154. https://doi.org/10.1016/0022-0000(79)90044-8. http://www.sciencedirect.com/science/article/pii/0022000079900448
MathSciNet
Article
MATH
Google Scholar
Cicek I, Pusane AE, Dundar G (2014) A novel design method for discrete time chaos based true random number generators. Integr VLSI J 47(1):38–47. https://doi.org/10.1016/j.vlsi.2013.06.003. http://www.sciencedirect.com/science/article/pii/S0167926013000308
Article
Google Scholar
Coron JS (1999) On the security of random sources. In: Public key cryptography. Springer, Berlin, pp 29–42
Davis D, Ihaka R, Fenstermacher P (1994) Cryptographic randomness from air turbulence in disk drives. In: Desmedt YG (ed) Advances in cryptology — CRYPTO ’94. Springer, Berlin, pp 114–120
Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D (2013) Security analysis of pseudo-random number generators with input: /dev/random is not robust. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, CCS ’13. ACM, New York, pp 647–658, DOI https://doi.org/10.1145/2508859.2516653
Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on lft based s-boxes and chaos. Multimed Tools Appl 77(7):8759–8783. https://doi.org/10.1007/s11042-017-4772-0
Article
Google Scholar
Kanak A, Ergun S (2017) A practical biometric random number generator for mobile security applications. IEICE Trans Fund Electron Commun Comput Sci E100.A (1):158–166. https://doi.org/10.1587/transfun.E100.A.158
Article
Google Scholar
Keuninckx L, Soriano MC, Fischer I, Mirasso CR, Nguimdo RM, der Sande GV (2017) Encryption key distribution via chaos synchronization. Sci Rep, 7(43428). https://doi.org/10.1038/srep43428
Marsaglia G (1995) The marsaglia random number cdrom including the diehard battery of tests of randomness. http://stat.fsu.edu/pub/diehard/
Oteo JA, Ros J (2007) Double precision errors in the logistic map: statistical study and dynamical interpretation. Phys Rev E 76:036214. https://doi.org/10.1103/PhysRevE.76.036214
Article
Google Scholar
Sanguinetti B, Martin A, Zbinden H, Gisin N (2014) Quantum random number generation on a mobile phone. Phys Rev X 4:031056. https://doi.org/10.1103/PhysRevX.4.031056
Google Scholar
Schindler W, Killmann W (2003) Evaluation criteria for true (physical) random number generators used in cryptographic applications. In: Cryptographic hardware and embedded systems - CHES 2002, lecture notes in computer science, vol 2523. Springer, Berlin, pp 431–449. https://doi.org/10.1007/3-540-36400-5_31
Suciu A, Lebu D, Marton K (2011) Unpredictable random number generator based on mobile sensors. In: 2011 IEEE 7th international conference on intelligent computer communication and processing, pp 445–448. https://doi.org/10.1109/ICCP.2011.6047913
Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlin Dyn 81(3):1067–1079. https://doi.org/10.1007/s11071-015-2049-6
Article
Google Scholar
Teh JS, Samsudin A, Al-Mazrooie M, Akhavan A (2015) Gpus and chaos: a new true random number generator. Nonlin Dyn 82(4):1913–1922. https://doi.org/10.1007/s11071-015-2287-7
MathSciNet
Article
Google Scholar
Walker J (2008) Pseudorandom number sequence test program. http://www.fourmilab.ch/random/
Wallace K, Moran K, Novak E, Zhou G, Sun K (2016) Toward sensor-based random number generation for mobile and iot devices. IEEE Internet Things J 3(6):1189–1201. https://doi.org/10.1109/JIOT.2016.2572638
Article
Google Scholar
Wei W, Guo H (2009) Bias-free true random-number generator. Opt Lett 34 (12):1876–1878. https://doi.org/10.1364/OL.34.001876. http://ol.osa.org/abstract.cfm?URI=ol-34-12-1876
MathSciNet
Article
Google Scholar
Xingyuan W, Xue Q, Lin T (2012) A novel true random number generator based on mouse movement and a one-dimensional chaotic map. Mathematical Problems in Engineering
Yoshizawa Y, Kimura H, Inoue H, Fujita K, Toyama M, Miyatake O (1999) Physical random numbers generated by radioactivity. J Japanese Soc Comput Statist, 2012. https://doi.org/10.5183/jjscs1988.12.67
Zhang X, Qi L, Tang Z, Zhang Y (2014) Portable true random number generator for personal encryption application based on smartphone camera. Electron Lett 50(24):1841–1843. https://doi.org/10.1049/el.2014.2870
Article
Google Scholar
Zhao L, Liao X, Xiao D, Xiang T, Zhou Q, Duan S (2009) True random number generation from mobile telephone photo based on chaotic cryptography. Chaos, Solitons & Fractals 42(3):1692–1699. https://doi.org/10.1016/j.chaos.2009.03.068. http://www.sciencedirect.com/science/article/pii/S0960077909001866
Article
Google Scholar