[1]
N. G. Bourbakis and A. Dollas, SCAN-based compression-encryption-hiding for video on demand, IEEE Multimedia, vol. 10, no. 3, p.79–87, (2003).
DOI: 10.1109/mmul.2003.1218259
Google Scholar
[2]
S. S. Maniccam and N. G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition, vol. 37, no. 4, p.725–737, (2004).
DOI: 10.1016/j.patcog.2003.08.011
Google Scholar
[3]
H. K. -C. Chang and J. -L. Liu, A linear quadtree compression scheme for image encryption, Signal Processing: Image Communication, vol. 10, no. 4, p.279–290, (1997).
DOI: 10.1016/s0923-5965(96)00025-2
Google Scholar
[4]
C. K. Huang, H. H. Nien, Multi chaotic system based pixel shuffle for image encryption, Optics communications, 2009, 282: 2123-2127.
DOI: 10.1016/j.optcom.2009.02.044
Google Scholar
[5]
G. Ye. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern. Recognition Lett. 31(5), (2010): 347-354.
DOI: 10.1016/j.patrec.2009.11.008
Google Scholar
[6]
Fuwen Liu, Hartmut Koenig, A survey of video encryption algorithms, computers security 29 (2010) 3-1 5.
Google Scholar
[7]
C.C. Chang, T.X. Yu, Cryptanalysis of an encryption scheme for binary images, Pattern Recognition Letters, vol. 23, no. 14, p.1847–1852, (2002).
DOI: 10.1016/s0167-8655(02)00157-5
Google Scholar
[8]
E. Solak, R. Rhouma , S. Belghith, Cryptanalysis of a multi-chaotic systems based image cryptosystem, Optics Communications 283 (2010) 232–236.
DOI: 10.1016/j.optcom.2009.09.070
Google Scholar
[9]
S. J. Li, et al., A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Process. Image Commun. 23(3), (2008) 212-223.
DOI: 10.1016/j.image.2008.01.003
Google Scholar