|
[1] W. Zeng and S. Lei,“Efficient frequency domain selective scrambling of digital video,”Multimedia, IEEE Transactions on , Vol. 5 , Issue: 1 , pp.118 — 129, March 2003 [2] J. Wen, M. Severa, W. Zeng, M. Luttrell and W. Jin, ” A format-compliant configurable encryption framework for access control of video,” Circuits and Systems for Video Technology, IEEE Transactions on , Vol. 12 , Issue: 6, pp.545 — 557, June 2002 [3] T. Maples and G.. Spanos,“Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video,”In Proceedings of 4th International Conference on Computer Communications and Networks (ICCCN’95), Las Vegas, Nevada, Sept. 1995. [4] I. Agi and L. Gong,“ An empirical study of secure MPEG video transmissions,” Proceedings of the Symposium on Network and Distributed System Security, 1996., pp.137 — 144 , 22-23 Feb. 1996, [5] M. S. Kankanhalli and T. T. Guan, ”Compressed-Domain Scrambler/Descrambler for Digital Video,” Consumer Electronics, IEEE Transactions on , Vol.48 , Issue: 2, pp.356 - 365 , May 2002 [6] S. Lian and Z. Wang, ” Comparison of several wavelet coefficient confusion methods applied in multimedia encryption,” Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on, pp.372 — 376, 20-23 Oct. 2003 [7] C. Wang, H.B. Yu, M. Zheng ” A DCT-based MPEG-2 transparent scrambling algorithm,” Consumer Electronics, IEEE Transactions on , Vol. 49 , Issue: 4, pp.1208 — 1213, Nov. 2003 [8] H. Cheng and L. Xiaobo, “Partial encryption of compressed images and videos,” Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], Vol. 48, Issue: 8 , pp.2439 — 2451, Aug. 2000 [9] J.L. Huang ,”The encryption/ decryption of video data via the modification of VLC table,” Master Thesis, NCTU, 2001 [10] Y.M. Chen and S.J. Wang, ”A New Video Encryption Technique Based on Modification of VLC Tables, Disarrangement of RLC indices, Randomized Bit-Flipping, and Randomized Bit-Insertion,” 16th IPPR Conference on Computer Vision, Graphics and Image Processing(GVGIP 2003) , pp.560 — 567, Kinmen, ROC,17-19 Aug. 2003 [11] C.P. Wu and C.C. Jay Kuo,“Efficient Multimedia Encryption via Entropy Codec Design,” in Proceedings of SPIE Volume 4314 -- Security and Watermarking of Multimedia Contents III, pp.128-138, San Jose, CA, USA, Jan. 2001. [12] C. Shi and B. Bhargava,“A fast MPEG video encryption algorithm ,” In Proceedings of the ACM Multimedia 1998, pp.81—88, Boston, USA, 1998 [13] A. S. Tosun and W.C. Feng ,“On error preserving encryption algorithms for wireless video transmission,”Proceedings of the ninth ACM international conference on Multimedia ,pp.302-308, Oct. 2001. [14] F. Chiaraluce, L. Ciccarelli, E. Gambi, Paola P. and M. Reginelli,“A new chaotic algorithm for video encryption,”Consumer Electronics, IEEE Transactions on , Vol. 48 , Issue: 4, pp.838 — 844, Nov. 2002 [15] D. Long , W. Jia, M. Li,“ On synchronous coding,” Proceedings of the 3rd IEEE International Conference on Information Technology: Coding and Computing (ITCC-2002), pp.390-395, Las Vegas, USA, 8-10 April 2002 [16] D. W. Jones , “ Application of splay trees to data compression,” Communications of the ACM, Vol. 31, Issue: 8, pp.996-1007, Aug. 1988
|