[1] |
WIEGAND T , SULLIVAN G J , BJONTEGAAD G . Overview of the H.264/AVC video coding standard[J]. IEEE Transactions on Circuits System Video Technology, 2003,13:560-576.
|
[2] |
JOHNSON M , ISHWAR P , PRABAKARAN V . On compressing encrypted data[J]. IEEE Transactions on Signal Processing, 2004,52(10): 2992-3006.
|
[3] |
廉士国, 孙金生, 王执铨 . 视频加密算法及其发展现状[J]. 信息与控制 2004,35(5): 560-566. LIAN S G , SUN J S , WANG Z Q . Video encryption and its development[J]. Information and Control, 2004,35(5): 560-566.
|
[4] |
AHN J , SHIM H J , JEON B . Digital video scrambling method using intra prediction mode[A]. PCM 2004[C]. 2004.386-393.
|
[5] |
LI Y , LIANG L W , SU Z P . A new video encryption algorithm for H.264[A]. IEEE 5th International Conference on Information, Communi-cations, and Signal Processing[C]. 2005.1121-1124.
|
[6] |
曹弈, 张荣, 刘政凯 . H.264标准中基于DCT的视频加密研究[J]. 中国图像图形学报, 2005,10(8): 1047-1051. CAO Y , ZHANG R , LIU Z K . Research on DCT-based video encryption under H.264[J]. Journal of Image and Graphics, 2005,10(8): 1047-1051.
|
[7] |
SPINSANTE S , CHIARALUCE F , GAMBI E . Masking video information by partial encryption of H.264/AVC coding parameters[EB/OL]. , 2005.
|
[8] |
XIE D , KUO C J . Enhanced multiple Huffman table (MHT) encryption scheme using key hopping[A]. Proceedings of the 2004 International Symposium on Circuits and Systems[C]. 2004.568-571.
|
[9] |
WU C , KUO C J . Design of integrated multimedia compression and encryption systems[J]. IEEE Transactions on Multimedia, 2005,7(5): 828-839.
|
[10] |
LIU Z , LI X . Motion vector encryption in multimedia streaming[A]. Proceedings of the 10 International Multimedia Modeling Conference (MMM'04)[C]. 2004.64-71.
|
[11] |
LIAN S G , LIU Z , REN Z . Secure advanced video coding based on selective encryption algorithms[J]. IEEE Transactions on Consumer Electronics, 2006,52(2): 621-629.
|
[12] |
MARPE D , SCHWARZ H , WIEGAND T . Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard[J]. IEEE Transactions on Circuits and Systems, 2003,13(7): 620-636.
|
[13] |
VANSTONE S , MENEZES A , OORSCHOT P . Handbook of Applied cryptography[M]. CRC Press, 1996.
|
[14] |
MATTHEWS R . On the derivation of a chaotic encryption algorithm[J]. Cryptologia, 1989,8(1): 29-41.
|