[1]
C. E. Shannon. Communication theory of secrecy systems. Declassified Report, (1946).
Google Scholar
[2]
MPEG: H. 264/MPE_4 Part 10 White Paper www. vcodex. com. (2003).
Google Scholar
[3]
ITU-T Rec.H. 264/ISO/IEC 11496-10, Advanced Video Coding. Final Committee Draft, Document JVT-F100, (2002. 12).
Google Scholar
[4]
T. Wiegand, G. Sullivan, G. Bjontegaard and A. Luthra: Overview of the H. 264/AVC Video Coding Standard, IEEE Transactions on Circuits and Systems for Video Technology, (2003).
DOI: 10.1109/tcsvt.2003.815165
Google Scholar
[5]
Yinian Mao, and Min Wu: A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. IEEE Transactions on Image processing. Vol. 15, No. 7(2006).
DOI: 10.1109/tip.2006.873426
Google Scholar
[6]
L. Qiao, K. Nahrstedt: A New Algorithm for MPEG Video Encryption[C]. First International Conference on Imaging Science, Systems, and Technology, (1997).
Google Scholar
[7]
J. Meyer, F. Gadegast: Security mechanism of multimedia data with the example MPEG-1 video[C]. Berlin, Germany: Technical Univ. Berlin, (1995).
Google Scholar
[8]
Tang L: Methods for encrypting and decrypting MPEG video data efficiently [A]. Proceedings of the Fourth ACM International Multimedia Conference (ACM Mutimedia'96) [C]. Boston, MA, ( 1996).
DOI: 10.1145/244130.244209
Google Scholar
[9]
Wade Trappe, Lawrence C. Washington: Introduction to Cryptography with Coding Theory [M] (2008).
Google Scholar
[10]
Yuanzhi Zhou, Tiejun Huang, and Wen Gao: H. 264 Video Encyption Scheme Adaptive to DRM[J]. IEEE Trans. Consumer Electron., vol. 52, no. 4, pp: 1289-1297, Nov (2006).
DOI: 10.1109/tce.2006.273147
Google Scholar
[11]
P. Melih and D. Vadi: A MPEG-2-transparent scrambling technology[M]. IEEE Trans. Consumer Electron., vol. 48, no. 2, pp.345-355, ( May 2002).
Google Scholar
[12]
C. Wang, H-B. Yu, and M. Zheng: A DCT-based MPEG-2 transparent scrambling algorithm[J]. IEEE Trans. Consumer Electron., vol. 49, no. 4, pp: 1208 – 1213, Nov. (2003).
DOI: 10.1109/tce.2003.1261218
Google Scholar
[13]
Fuwen Liu, and Hartmut Koenig: A survey of video encryption algorithms[J]. Computers & Security, Vol. 29, No. 1, pp.3-15, (2009).
Google Scholar
[14]
Xiliang Liu , Ahmet M: Eskicioglu. Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions[J]. Proc. of Conf. Communications, Internet, and Information Technology, pp.17-19, (2003).
Google Scholar
[15]
Nidhi S. Kulkarni, Balasubramanian Raman, Indra Gupta. Multimedia Encryption: A Brief Overview[J]. SCI 231, pp.417-449, ( 2009).
Google Scholar
[16]
A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J. -J. Quisquater. Overview on Selective Encryption of Image and Video: Challenges and Perspectives. EURASIP J. on Information Securit. Article ID 179290, ( 2008).
DOI: 10.1155/2008/179290
Google Scholar
[17]
Fuwen Liu and Hartmut Koenig. A survey of video encryption algorithms. Computers & Security, Vol. 29, No. 1, pp.3-15, (2009).
Google Scholar
[18]
Xiliang Liu, Ahmet M. Eskicioglu. Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. Proc. of Conf. Communications, Internet, and Information Technology, pp.17-19, (2003).
Google Scholar
[19]
Nidhi S. Kulkarni, Balasubramanian Raman, Indra Gupta. Multimedia Encryption: A Brief Overview. SCI 231, pp.417-449, (2009).
Google Scholar
[20]
Tom Lookabaugh, Douglas C. Sicker, David M. Keaton, Wang Ye Guo, Indrani Vedula. Security Analysis of Selectively Encrypted MPEG-2 Streams. Proc. of Multimedia Systems and Applications, (2003).
DOI: 10.1117/12.512635
Google Scholar
[21]
Thomas Stutz , and Andreas Uhl: A Survey of H. 264 AVC/SVC Encryption. In IEEE transactions on Circuits and Systems for Video Techonology, Vol. 22, NO. 3 (2012).
DOI: 10.1109/tcsvt.2011.2162290
Google Scholar
[22]
Shi C, and Bhargava B: A fast MPEG video encryption algorithms. In: Proceedings of 6th ACM international conference on multimedia; (1998).
DOI: 10.1145/290747.290758
Google Scholar
[23]
Shi C, and Bhargava B. An efficient MPEG video encryption algorithms. In: Proceedings of IEEE symposium on reliable distributed systems; (1998).
DOI: 10.1109/reldis.1998.740527
Google Scholar
[24]
Shi C, Wang SY, Bhargava B. MPEG video encryption in real-time using secret key cryptography. International conference on parallel and distributed processing techniques and applications (PDPTA'99), Las Vegas, NV, USA; (1999).
Google Scholar
[25]
Wu C-P, and Kuo C-CJ. Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia (2005).
DOI: 10.1109/tmm.2005.854469
Google Scholar