[1]LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007,17(2):214-223.
[2]STUTZ T, UHL A. A survey of H.264 AVC/SVC encryption [J]. Circuits and Systems for Video Technology, 2012,22(3):325-339.
[3]WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H.264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78.
[4]WANG Y, DENG H. The video encryption scheme based in H.264 on perceptual encryption algorithm standards [J]. Application of Electronic Technique, 2012(1):56.(王亚民, 邓虎超. H.264标准中基于感知加密算法的视频加密方案[J].电子技术应用, 2012(1):56.)
[5]AU YEUNG S K, ZENG B. A new design of multiple transforms for perceptual video encryption[C]// Proceedings of the 2012 19th IEEE International Conference on Image Processing. Piscataway: IEEE Press, 2012: 2637-2640.
[6]AU YEUNG S K, ZENG B. Improved perceptual video encryption using multiple 8×8 transforms in MPEG-4[C]// Proceedings of the 2012 7th International ICST Conference on Communications and Networking in China. Piscataway: IEEE Press, 2012: 185-188.
[7]TONG L, DAI F, ZHANG Y. Compressive sensing based video scrambling for privacy protection [C]// Proceedings of the 2011 IEEE Visual Communications and Image Processing. Piscataway: IEEE Press, 2011: 1-4.
[8]FENG J. ZUC algorithm: 3GPP LTE international encryption standard [J]. China Information Security, 2011(12): 45-46.(冯秀涛. 3GPP LTE国际加密标准ZUC算法[J]. 信息安全与通信保密, 2011(12):45-46.)
[9]GUAN J, DING L, LIU S. Guess and determine attack on SNOW3G and ZUC [J]. Journal of Software, 2013, 24(6): 1324-1333.(关杰, 丁林, 刘树凯. SNOW3G与ZUC流密码的猜测决定攻击?[J].软件学报, 2013, 24(6): 1324-1333.)
[10]REN G, QIAO S, HEI Y. The application and implementation of ZUC stream cipher in the digital image encryption [J]. Science Technology and Engineering, 2013, 13(3):766-770.(任高峰, 乔树山, 黑勇. 祖冲之算法在数字图像加密中的应用与实现[J]. 科学技术与工程, 2013, 13(3):766-770.)
[11]MA J, XU J, BAO Y, et al. Compressive sensing and its application: from sparse to low-rank regularized optimization [J]. Signal Processing, 2012, 28(5): 609-623.(马坚伟, 徐杰, 鲍跃全, 等. 压缩感知及其应用: 从稀疏约束到低秩约束优化[J]. 信号处理, 2012, 28(5): 609-623.)
[12]ATHIRA V, GEORGE S N, DEEPTHI P P. A novel encryption method based on compressive sensing [C]// Proceedings of the 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing. Piscataway: IEEE Press, 2013: 271-276.
[13]HUANG R, SAKURAI K. A robust and compression-combined digital image encryption method based on compressive sensing [C]// Proceedings of the 2011 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Washington, DC: IEEE Computer Society,2011: 105-108.
[14]BERINDE R, INDYK P. Sparse recovery using sparse random matrices [EB/OL].[2013-10-10]. http://people.csail.mit.edu/indyk/report.pdf.
[15]LIN X, LU G, YAN J, et al. Measurement matrix of compressive sensing based on Gram-Schmidt orthogonalization [C]// Proceedings of the 2011 6th International Conference on Image and Graphics. Piscataway: IEEE Press, 2011: 205-210.
[16]FANG H, ZHANG Q, WEI H. Image reconstruction based on improved backward optimized orthogonal matching pursuit algorithm [J]. Journal of South China University of Technology: Natural Science, 2008,36(8):23-27.(方红,章权兵,韦穗.改进的后退型最优正交匹配追踪图像重建方法[J].华南理工大学学报:自然科学版,2008,36(8):23-27.)
[17]LIU F, KOENIG H. A survey of video encryption algorithms [J]. Computers and Security, 2010, 29(1): 3-15.
[18]YAO Y, XU Z. Visual security assessment for video encryption based on structural distortion [J]. Computer Engineering, 2008,34(23):23-25.(姚晔,徐正全.基于结构失真度的视频加密视觉保密性评价[J].计算机工程, 2008,34(23):23-25.)
[19]WANG Z, LU L, BOVIK A C. Video quality assessment based on structural distortion measurement [J]. Signal Processing: Image Communication, 2004, 19(2): 121-132.
[20]CHEN J, LIU J, CAO X. In-depth understanding of video codec technology: H.264 standard and reference model [M]. Beijing: Beijing University of Aeronautics and Astronautics Press,2012.(陈靖,刘京,曹喜信.深入理解视频编解码技术:基于H.264标准及参考模型 [M]. 北京:北京航空航天大学出版社,2012.)
[21]CHEN G, LIAO X. Image encryption based on discrete chaotic maps [J]. , 2005, 25(S1): 121-123.(陈果,廖晓峰.一种基于混沌映射的图像加密算法[J].计算机应用,2005,25(S1):121-123.)
[22]RACHLIN Y, BARON D. The secrecy of compressed sensing measurements[C]// Proceedings of the 2008 46th Annual Allerton Conference on Communication, Control, and Computing. Piscataway: IEEE Press, 2008: 813-817. |