参考文献/References:
[ 1] Yuan C, Zhu B B, W ang Y, et a .l E fficien t and fu lly scalable encryption forMPEG- 4 FGS[ C] / / Proc IEEE Int Sympos-i um on C ircu its and Systems, 2003( 2): 620-623.
[ 2] W ee S J, Aposto lopoulos J G. Secure scab lab le stream ing enab ling transcod ingw ithout decryp tion[ C] / / Proc IEEE Int Conference on Im age Process ing, 2001( 1): 437-440.
[ 3] Tosun A S, FengW C. L ightw eigh t secur itym echanism s fo rw ire less v ideo transm ission[ C] / / Proc IEEE In t Conference on Info rma tion Techno logy: Coding and Compu ting, 2001: 157-161.
[ 4] W o lfram S. Cryptog raphyw ith cellu lar autom ata[ C] / / Advances in Crypto logy-CRYPTO 85, Lecture Notes in Com pute r Sc-i ence, 1985( 218): 429-432.
[ 5] Nandy S, Kar B K, Chaudhur i P. Theory and app lications of cellu lar autom ata in cryptography[ J]. IEEE Trans Com put, 1994, 43: 1 346-1 357.
[ 6] M iha ljev icM. Security exam ination of certa in ce llu lar autom ata based key stream gene rato r[ C] / / ISITA 96- 1996 IEEE Int Sym p In fo rm Theory and App,l 1996: 246-249.
[ 7] Chen R, LuW, La i J. Im ag e encryption using prog ressive ce llu la r autom ata substitution and SCAN[ C ] / / IEEE ISCAS, 2005( 2): 1 690-1 693.
[ 8] Chaudhuri P P, Chaudhuri D R, N andi S, et a.l Add itive Ce llu la r Autom ata: Theory and Applications[M ]. New York: IEEE Press, 1997.
[ 9] Sutner K. Additive autom a ta on graphs[ J]. Comp lex Systems, 1998, 2( 1) : 1-28.
[ 10] Shap iro JM. Embedded im age coding us ing ze ro trees o fw av elet cod ing [ J]. IEEE Transactions on Signa lProcessing, 1993, 41( 12): 3 445-3 462.
[ 11] Sa id A. A new fast and effic ient im age code based on se t pa rtition ing in h ierarch ica l trees[ J]. IEEE Transactions on C ircuits and System s forV ideo Technology, 1996( 6) : 243-250.
[ 12] L ian S, W ang Z. Com parison o f sev era lw av elet coeffic ients con fusion m ethods app lied in mu ltim ed ia encryption[ C] / / Proc Int Conference on Com puter Netwo rks andM obile Com puting, 2003: 372-376.