[1] |
LEI J , HAN Z , VáZQUEZ-CASTRO M A , et al. Secure satellite communication systems design with individual secrecy rate con-straints[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):661-671.
|
[2] |
文昌辞, 王沁, 黄付敏 等. JPEG彩色图像自适应加密算法[J]. 计算机辅助设计与图形学学报 2012,24(4): 500-505. WEN C C , HUANG Q , TIAN F M , et al. Self-adaptive encryption for JPEG color images[J]. Journal of Computer-Aided Design &Computer Graphics, 2012,24(4): 500-505.
|
[3] |
SUN Q , APOSTOLOPOULOS J , CHEN C W , et al. Quality-optimized and secure end-to-end authentication for media delivery[J]. Proceedings of the IEEE, 2008,96(1):97-111.
|
[4] |
HEFEEDA M , MOKHTARIAN K . Authentication schemes for mul-timedia streams: quantitative analysis and comparison[J]. ACM Transactionson Multimedia Computing, Communications and Appli-cations, 2010,6(1):1-24.
|
[5] |
GENNARO R , ROHATGI P . How to sign digital streams[A]. Proceedings of the Advances in Cryptology[C]. Springer 1997.180-197.
|
[6] |
WONG C K , LAM S S . Digital signatures for flows and multicasts[A]. Proceedings of the IEEE International Conference on Network Protocols[C]. 1998.198-209.
|
[7] |
PERRIG A , CANETTI R , TYGAR J , et al. Efficient authentication and signing of multicast streams over lossy channels[A]. Proceedings of the IEEE Symposium on Security and Privacy, 2000.56-73.
|
[8] |
GOLLE P , MODADUGU N . Authenticating streamed data in the presence of random packet loss[A]. Proceedings of the Network and Distributed Systems Security Symposium[C]. 2001.13-22.
|
[9] |
ZHANG Z , SUN Q , APOSTOLOPOULOS J , et al. Generalized butterfly graph and its application to video stream authentication[J]. IEEE Transactions on Circuits Systems for Video Technology, 2009,19(7):965-977.
|
[10] |
ZHANG Z , SUN Q , WONG W C , et al. An optimized content-aware authentication scheme for streaming JPEG-2000 images over lossy networks[J]. IEEE Transactions on Multimedia, 2007,9(2):320-331.
|
[11] |
WANG W , PENG D , WANG H , et al. A multimedia quality-driven network resource management architecture for wireless sensor networks with stream authentication[J]. IEEE Transactions on Multimedia, 2010,12(5):439-447.
|
[12] |
WANG W , WANG H , HUA K , et al. Quality-optimized energy neu-trality with link layer resource allocation for zero-power harvesting wireless communications[A]. Proceedings of the Global Telecommu-nications Conference[C]. 2011.
|
[13] |
PARK J , CHONG E , SIEGEL H . Efficient multicast stream authenti-cation using erasure codes[J]. ACM Transactions on Information and System Security, 2003,6(2):258-285.
|
[14] |
PANNETRAT A , MOLVA R . Efficient multicast packet authentication[A]. Proceedings of the Network and Distributed Systems Security Symp[C]. 2003.
|
[15] |
HEFEEDA M , MOKHTARIAN K . Authentication of scalable video streams with low communication overhead[J]. IEEE Transactions on Multimedia, 2010,12(7):730-742.
|
[16] |
LI Z , SUN Q , LIAN Y , et al. Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks[J]. IEEE Transactions on Multimedia, 2007,9(4):837-850.
|
[17] |
ZHOU L , ZHENG B , WEI A , et al. A scalable information security technique: joint authentication-coding mechanism for multimedia over heterogeneous wireless networks[J]. Wireless Personal Communications, 2009,51:5-16.
|
[18] |
ZHU X , ZHANG Z , CHEN C W . A joint layered coding scheme for unified reliable and secure media transmission with implementation on JPEG 2000 images[A]. Proceedings of the IEEE International Conference on Multimedia & Expo[C]. 2009.710-717.
|
[19] |
LI L , ZHOU G , FIETHE B , et al. Efficient implementation of the CCSDS 122.0-B-1 compression standard on a space-qualified field programmable gate array[J]. Journal of Applied Remote Sensing, 2013,3(1):033543.
|
[20] |
Image Data Compression[S]. CCSDS Recommendation for Space Data System Standards 1220-B-1 Issue 1 Cor 2, 2008.
|
[21] |
雷震霖 . 空间图像CCSDS压缩算法研究与FPGA实现[D]. 大连 大连理工大学, 2007. LEI Z L . Study on CCSDS Space Image Compression Algorithm and FPGA Implementation[D]. Dalian Dalian University of Technology, 2005,20(2): 161-169.
|
[22] |
YI X , LI M , ZHENG G , et al. Quality-optimized authentication of scalable media streams with flexible transcoding over wireless networks[A]. Proceedings of the 3rd FTRA International Conference Mobile, Ubiquitous, and Intelligent Computing[C]. 2012.148-153.
|