[1]經濟部數位內容產業推動辦公室,available at http://www.dcipo.org.tw/. Accessed 11 July 2013.
[2]楊士萱、陳柏源,H.264/AVC 技術與應用簡介,影像與識別,第十三卷,第二期,頁4-18,2007。[3]左仕沛,基於編碼增益下H.264解碼器移動補償之復雜度控制,國立中央大學通訊工程學系碩士論文,桃園,2011。[4]蔡茗光,H.264 視訊編碼之同步式逆向錯誤追蹤演算法,國立中央大學通訊工程學系碩士論文,桃園,2004。[5]邱俊瑋,具有低運算量與壓縮率的H.264/AVC數位視訊加密,國立嘉義大學資訊工程研究所碩士論文,嘉義,2008。[6]Information technology─Coding of audio-visual-objects: Visual ISO/IEC 14496-2 committee drafts,”ISO/IEC 14496-2, Nov. 1997.
[7]Draft Recommendation H.263, ITU Telecommunication Union,Telecommunications Standardization Sector SG 15, Dec, 1995.
[8]S. Sakazawa, Y. Takishima and Y. Nakajima,”H.264 native video watermarking method,” in Proceedings of ISCAS, pp. 1439-1442, May 2006.
[9]Joint Video Team, Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification, ITU-T Rec. H.264 and ISO/IEC 14496-10 AVC, May 2003.
[10]T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. on Circuits and Systems for Video Technology, vol.13, no. 7, pp. 560–576, July 2003.
[11]J. Teuhola, “A compression method for clustered bit-vectors,” in Proceeding of. Letter, Vol. 10, No. 7, pp. 308-311, 1978.
[12]I. E. G.Richardson,The H.264 Advanced Video Compression Standard, seconded. John Wiley and Sons, 2010.
[13]National Institute of Standards and Technology (U.S.). Advanced Encryption Standards (AES). FIPS Publication 197, 2001.
[14]National Institute of Standards and Technology (U.S.). Data Encryption Standards (DES).FIPS Publication 46-3, NIST, 1999.
[15]Y. Fan, J. Wang, T.IKENAGA, Y. TSUNOO and S. GOTO, “An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard, ”IEICE Transactionon Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.1, Jan. 2008.
[16]Q.Z. Li, Y.C. Shen, and X. Li, “A Visual Information Encryption Algorithm for Video Conference, ”IEEE Trans.Circuits Syst. Video Technol., pp. 305-308 Dec. 2010.
[17]Z. Liu, S. Lian, Z. Ren and H. Wang, “Secure Advanced Video Coding Based on Selective Encryption Algorithm,” IEEE Transactions on Consumer Electronics, Vol. 52, Issue 2, pp. 612-629, May 2006.
[18]Y. Li, L. Liang, Z. Su and J. Jiang, “An New Video Encryption Algorithm for H.264,” in Proceedings of Communications and Signal Processing, pp. 1121-1124, Dec. 2005.
[19]Jay M. Joshi and Upena D. Dalal, “Histogram Matching Attack on Selective Perceptual Video Encryptions in H.264/AVC,” IEEE Digital Object Identifier,pp357-360 Dec. 2012
[20]Y. Liu, C. Yuan and Y. Zhong, “A New Digital Rights Management System In Mobile Applcations Using H.264 Encryption,” in Proceedings of Advanced Communication Technology, Vol.1, pp. 583-586, Feb. 2007.
[21]Y. Wang, M Cai and F. Tang, “Design of a New Selective Video Encryption Scheme Based on H.264,” in Proceedings of Computational Intelligence and Security, pp. 882-883, Dec. 2007.
[22]JM http://iphome.hhi.de/suehring/tml/. Accessed 11 July 2013.