张小红, 袁春经. 控制关键帧选择的H.264熵编码加密算法[J].中国图象图形学报, 2014, 19(3): 358-364. doi: 10.11834/jig. 20140303.
|
ZHANG Xiaohong and YUAN Chunjing. H.264 video entropy coding encryption by controlling key frames[J]. Journal of Image and Graphics, 2014, 19(3): 358-364. doi: 10.11834/jig.20140303.
|
HAMIDOUCHE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system in the SHVC extension[C]. International Conference on Acoustics, Speech and Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766. doi: 10.1109/ICASSP.2015.7178273.
|
LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223. doi: 10.1109/TCSVT.2006.888840.
|
WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H.264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78. doi: 10.1016/S1005- 8885(08)60159-4.
|
AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345. doi: 10.1109/TCSVT.2011.2125630.
|
AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and Networking, Kun ming, 2012: 189-192. doi: 10.1109/ ChinaCom.2012.6417473.
|
ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 309-320. doi: 10.1109/TIFS.2013. 2293955.
|
AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryption[C]. 2012 19th IEEE International Conference on Image Processing, Orlando, 2012: 2637-2640. doi: 10.1109/ICIP.2012.6467440.
|
AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 88 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188. doi: 10.1109/ ChinaCom.2012.6417472.
|
ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H.264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619. doi: 4028/www. scientific.net/AMR.765- 767.615.
|
SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H.264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859. doi: 10.1007/978-3-642-42057- 3_107.
|
ZHU H, ZHAO C, and ZHANG X. A novel image encryption- compression scheme using hyper-chaos and Chinese
|
remainder theorem[J]. Signal Processing: Image Communication, 2013, 28(6): 670-680. doi: 10.1016/j.image. 2013.02.004.
|
ASGHAR M N, GHANBARI M, FLEURY M, et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream[J]. Journal of Visual Communication Image Representation, 2014, 25: 487-498. doi: 10.1016/j.jvcir.2013. 12.015.
|
ZHUO L, MAO N S, ZHANG J, et al. Bit-sensitivity based video encryption scheme in compressed domain[J]. International Journal of Advancements in Computing Technology, 2012, 4(8): 155-164. doi: 10.4156/ijact.vol4. issue8.19.
|
ASGHAR M N and GHANBARI M. An efficient security system for CABAC bin-strings of H.264/SVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(3): 425-437. doi: 10.1109/TCSVT.2012.2204941.
|
ASGHAR M N, GHANBARI M, and REED M J. Sufficient encryption with codewords and bin-strings of H.264/SVC[C]. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012: 443-450. doi: 10.1109/TrustCom.2012.268.
|
SHAHID Z, CHAUMONT M, and PUECH W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(5): 565-576. doi: 10.1109/TCSVT.2011.2129090.
|
WANG Y, O,NEILL M, and KURUGOLLU F. A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(9): 1476-1490. doi: 10.1109/TCSVT.2013.2248588.
|
MENEZES A J, VAN OORESCHOT P C, and VANSTONE S A. Handbook of Applied Cryptography[M]. Boca Raton: CRC Press, 1996. doi: 10.1201/9781439821916.
|
WANG Z, LU L, and BOVIK A C. Video quality assessment based on structural distortion measurement[J]. Signal Processing: Image Communication, 2004, 19(2): 121-132. doi: 10.1016/S0923-5965(03)00076-6.
|