MAGLI E, GRANGETTO M, and OLMO G. Joint source, channel coding, and secrecy[J]. EURASIP Journal on Information Security, 2007, 2007(1): 1-7. doi: 10.1155/2007/ 79048.
|
BOYD C, CLEARY J, IRVINE S, et al. Integrating error detection into arithmetic coding[J]. IEEE Transactions on Communications, 1997, 45(1): 1-3. doi: 10.1109/26.554275.
|
GRANGETTO M and COSMAN P. MAP decoding of arithmetic codes with a forbidden symbol[C]. Proceedings of Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002: 82-89.
|
GRANGETTO M, MAGLI E, and OLMO G. Joint source/channel coding and MAP decoding of arithmetic codes[J]. IEEE Transactions on Communications, 2005, 53(6): 1007-1016. doi: 10.1109/TCOMM.2005.849690.
|
JAMAA S B, KIEFFER M, and DUHAMEL P. Improved sequential MAP estimation of CABAC encoded data with objective adjustment of the complexity/efficiency tradeoff [J]. IEEE Transactions on Communications, 2009, 57(7): 2014-2023. doi: 10.1109/TCOMM.2009.07.070566.
|
SPITERI T and BUTTIGIEG V. Maximum a posteriori decoding of arithmetic codes in joint source-channel coding[C]. International Joint Conference on e-Business and Telecommunications, Athens, 2012: 363-377. doi: 10.1007/ 978-3-642-25206-8_24.
|
夏志进, 杨铭, 崔慧娟, 等. 多禁止符号算术编码高效错误检测算法[J]. 清华大学学报(自然科学版), 2005, 45(7): 935-938. doi: 10.3321/j.issn:1000-0054.2005.07.019.
|
XIA Zhijin, YANG Ming, CUI Huijuan, et al. Efficient arithmetic code error detection algorithm with multiple forbidden symbols[J]. Journal of Tsinghua University(Science and Technology), 2005, 45(7): 935-938. doi: 10.3321/j.issn: 1000-0054.2005.07.019.
|
GRANGETTO M, MAGLI E, and OLMO G. Multimedia selective encryption by means of randomized arithmetic coding[J]. IEEE Transactions on Multimedia, 2006, 8(5): 905-917. doi: 10.1109/TMM.2006.879919.
|
MI B, LIAO X F, and CHEN Y. A novel chaotic encryption scheme based on arithmetic coding[J]. Chaos Solitons Fractals, 2008, 38(5): 1523-1531. doi: 10.1016/j.chaos. 2007.01.133.
|
李林森, 张灿, 陈德元. 基于CCSDS IDC的联合信源与安全编译码[J]. 中国科学院学报, 2012, 29(3): 384-391.
|
LI Linsen, ZHANG Can, and CHEN Deyuan. Joint source encryption coding based on CCSDS image data compression standard[J]. Journal of University of Chinese Academy of Sciences, 2012, 29(3): 384-391.
|
LIN Q Z and WONG K W. An improved iterative decoding scheme based on error-resistant arithmetic code[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 1704-1707. doi: 10.1109/ISCAS.2014. 6865482.
|
ZEZZA S, MASERA G, and NOOSHABADI S. A novel decoder architecture for error resilient JPEG2000 applications based on MQ arithmetic[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 902-905. doi: 10.1109/ISCAS.2014. 6865282.
|
ZHANG C Y, XIANG F, and ZHANG L W. Study on cryptographical properties of several chaotic pseudorandom sequences[C]. 2009 International Symposium on Computer Network and Multimedia Technology, Wuhan, 2009: 1-4. doi: 10.1109/CNMT.2009.5374713.
|
JAMAA S B, WEIDMANN C, and KIEFFER M. Analytical tools for optimizing the error correction performance of arithmetic codes[J]. IEEE Transactions on Communications, 2008, 56(9): 1458-1468. doi: 10.1109/TCOMM.2008.060401.
|
STALLINGS W, 王张宜, 杨敏, 等. 密码编码学与网络安全原理与实践(第5版)[M]. 北京: 电子工业出版社, 2012: 106-137.
|
STALLINGS W, WANG Zhangyi, YANG Min, et al. Cryptography and Network Security: Principles and Practice (Fifth Edition)[M]. Beijing: Publishing House of Electronics Industry, 2012: 106-137.
|
HAGENAUER J. Rate-compatible punctured convolutional codes (RCPC codes) and their applications[J]. IEEE Transactions on Communications, 1988, 36(4): 389-400. doi: 10.1109/26.2763.
|
刘泉, 李佩玥, 章明朝, 等. 基于可Markov分割混沌系统的图像加密算法[J]. 电子与信息学报, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
|
LIU Quan, LI Peiyue, ZHANG Mingchao, et al. Image encryption algorithm based on chaos system having Markov portion[J]. Journal of Electronics Information Technology, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
|
邓晓衡, 廖春龙, 朱从旭, 等. 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014, 35(3): 216-223. doi: 10.3969/j.issn.1000-436x.2014.03.025.
|
DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216-223. doi: 10.3969/j.issn. 1000-436x.2014.03.025.
|
RUKHIN A, SOTO J, NECHVATAL J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, SP-800-22[R]. Washington: National Institute of Standards and Technology, 2001.
|
张顺, 高铁杠. 基于类DNA编码分组与替换的加密方案 [J]. 电子与信息学报, 2015, 37(1): 150-157. doi: 10.11999/ JEIT140091.
|
ZHANG Shun and GAO Tiegang. Encryption based on DNA coding, codon grouping and substitution[J]. Journal of Electronics Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091.
|