2Mastan M K J, Sathishkumar G A, Hoopathy B K B. A color image encryption technique based on a substitution-permutation network [J] Advances in Computing and Communications, 2011, 193 (5) : 524 533.
3Ji Won Yoon, Kim Hyoungshick. An image encryption scheme with a pseudorandom permutation based on chaotic maps E J. Commun Nonlinear Sci Numer Simulation, 2010,15(12) :3998 - 4006.
4Engel D, Stiitz T, Uhl A. A survey on JPEG2000 encryption [J]. Multimedia Systems, 2009, 15 (4)= 243 - 270.
5Bellare M, Ristenpart T, Rogaway P, et al. Format- preserving encryption [C] // Proceedings of Selected Areas in Cryptography (SAC 2009). Berlin: Springer, 2009:295 - 312.
6StiJtz T, Uhl A. One format-compliant iterative encryption of JPEG2000 [C] // Proceedings of the Eighth IEEE International Symposium on Multimedia. San Diego: IEEE, 2006:985- 990.
7Engel D, Sttitz T, Uhl A. Format-compliant JPEG2000 encryption in JPSEC: security, applicability and the impact of compression parameters E J . EURASIP Journal on Information Security, 2007 (1): 1 -20.
8Razib Iqbal, Shervin Shirmohammadi. Compressed- domain video processing for adaptation, encryption, and authenticationE J ] IEEE Multimedia, 2008, 15 ( 2 ) .. 38 - 50.
9Hellwagner H, Kuschnig R. Efficient in-network adaptation of encrypted H. 264/SVC content [ J]. Signal Processing: Image Communication, 2009, 24(9) :740- 758.
10StiJtz T, Uhl A. Efficient format compliant encryption of regular languages., block-based cycle-walking EJ - Computer Science, 2010,6109 : 81 - 92.