| Citation: | BAI Sen, GUO Yu, ZHAO Bo, DAI Qinfang. CABAC Based H.264 Video Perceptual Encryption Algorithm with Adjustable Visual Quality[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2582-2589. doi: 10.11999/JEIT151478 | 
 
	                | 张小红, 袁春经. 控制关键帧选择的H.264熵编码加密算法[J].中国图象图形学报, 2014, 19(3): 358-364. doi: 10.11834/jig. 20140303. | 
| ZHANG Xiaohong and YUAN Chunjing. H.264 video entropy coding encryption by controlling key frames[J]. Journal of Image and Graphics, 2014, 19(3): 358-364. doi:  10.11834/jig.20140303. | 
| HAMIDOUCHE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system in the SHVC extension[C]. International Conference on Acoustics, Speech and Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766. doi:  10.1109/ICASSP.2015.7178273. | 
| LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223. doi:  10.1109/TCSVT.2006.888840. | 
| WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H.264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78. doi: 10.1016/S1005- 8885(08)60159-4. | 
| AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345. doi:  10.1109/TCSVT.2011.2125630. | 
| AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and Networking, Kun ming, 2012: 189-192. doi: 10.1109/ ChinaCom.2012.6417473. | 
| ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 309-320. doi: 10.1109/TIFS.2013. 2293955. | 
| AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryption[C]. 2012 19th IEEE International Conference on Image Processing, Orlando, 2012: 2637-2640. doi:  10.1109/ICIP.2012.6467440. | 
| AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 88 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188. doi: 10.1109/ ChinaCom.2012.6417472. | 
| ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H.264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619. doi: 4028/www. scientific.net/AMR.765- 767.615. | 
| SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H.264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859. doi: 10.1007/978-3-642-42057- 3_107. | 
| ZHU H, ZHAO C, and ZHANG X. A novel image encryption- compression scheme using hyper-chaos and Chinese | 
| remainder theorem[J]. Signal Processing: Image Communication, 2013, 28(6): 670-680. doi: 10.1016/j.image. 2013.02.004. | 
| ASGHAR M N, GHANBARI M, FLEURY M, et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream[J]. Journal of Visual Communication  Image Representation, 2014, 25: 487-498. doi: 10.1016/j.jvcir.2013. 12.015. | 
| ZHUO L, MAO N S, ZHANG J, et al. Bit-sensitivity based video encryption scheme in compressed domain[J]. International Journal of Advancements in Computing Technology, 2012, 4(8): 155-164. doi: 10.4156/ijact.vol4. issue8.19. | 
| ASGHAR M N and GHANBARI M. An efficient security system for CABAC bin-strings of H.264/SVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(3): 425-437. doi:  10.1109/TCSVT.2012.2204941. | 
| ASGHAR M N, GHANBARI M, and REED M J. Sufficient encryption with codewords and bin-strings of H.264/SVC[C]. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012: 443-450. doi:  10.1109/TrustCom.2012.268. | 
| SHAHID Z, CHAUMONT M, and PUECH W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(5): 565-576. doi:  10.1109/TCSVT.2011.2129090. | 
| WANG Y, O,NEILL M, and KURUGOLLU F. A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(9): 1476-1490. doi:  10.1109/TCSVT.2013.2248588. | 
| MENEZES A J, VAN OORESCHOT P C, and VANSTONE S A. Handbook of Applied Cryptography[M]. Boca Raton: CRC Press, 1996. doi:  10.1201/9781439821916. | 
| WANG Z, LU L, and BOVIK A C. Video quality assessment based on structural distortion measurement[J]. Signal Processing: Image Communication, 2004, 19(2): 121-132. doi:  10.1016/S0923-5965(03)00076-6. | 
