References
- Bystrom , M. and Modestino , J. W. 2000 . “Combined Sourcechannel Coding Schemes for Video Transmission over an Additive White Gaussian Noise Channel” . IEEE Journal on Selected Areas in Communcations , 18 ( 6 ) : 880 – 890 .
- Cheng , H. and Li , X. 2000 . “Partial Encryption of Compressed Images and Videos” . IEEE Transactions on Signal Processing , 48 ( 8 ) : 2439 – 2451 .
- Denis , A. and Kinsner , W. “Secure and Resilient Data Printed on Paper” . Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering . Edmonton, Alberta, Canada. Vol. 1 , pp. 245 – 248 . Shaw Conference Center .
- Ho , K. P. and Kahn , J. M. 1996 . “Transmission of Analog Signals Using Multicarrier Modulation: a Combined Source‐Channel Coding Approach” . IEEE Transactions on Communications , 44 ( 11 ) : 1432 – 1443 .
- Hwang , T. and Rao , T. R. N. 1990 . “Secret Error‐Correcting Codes (SECC)” . In Advances in Cryptology‐Crypto ’88 , 540 – 563 . New York, , USA : Springer‐Verlag .
- Lin , S. 1983 . Error Control Coding: Fundamentals and Applications , NJ, , USA : Prentice‐Hall .
- McEliece , R. J. 1978 . “A Public Key Cryptosystem Based on Algebraic Coding Theory” . DSN Progress Report 42–44 114 – 116 . CA, , USA : Jet Propulsion Laboratory .
- Meier , W. and Staffebach , O. 1989 . “Fast Correlation Attacks on Certain Stream Ciphers” . Journal of Cryptology , 1 ( 3 ) : 159 – 167 .
- Modestino , J. W. , Daut , D. G. and Vickers , A. L. 1981 . “Combined Source‐channel Coding of Images Using the Block Cosine Transform” . IEEE Transactions on Communications , IT‐33 ( 9 ) : 827 – 837 .
- Niederreiter , H. 1992 . Random Number Generation and Quasi‐Monte Carlo Methods , PA, , USA : Society of Industrial and Applied Mathematics .
- Rao , T. R. N. and Nam , K. 1987 . “Private‐Key Algebraic Cryptosystems” . In Advances in Cryptology‐Crypto ’86 , 35 – 48 . London, , UK : Springer‐Verlag .
- Rao , T. R. N. and Nam , K. 1989 . “Private‐Key Algebraic‐code Encryptions” . IEEE Transactions on Information Theory , IT‐35 ( 4 ) : 829 – 833 .
- Rukhin , A. , Soto , J. , Nechvatal , J. , Smid , M. , Barker , E. , Leigh , S. , Levenson , M. , Vangel , M. , Banks , D. , Heckert , A. , Dray , J. and Vo , S. 2001 . “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications” . National Institute of Standards and Technology publication 800–22
- Siegenthaler , T. 1985 . “Decrypting a Class of Stream Ciphers Using Ciphertext Only” . IEEE Transactions on Computing , C‐34 ( 1 ) : 81 – 85 .
- Stinson , D. R. 1995 . Cryptography: Theory and Practice , New York, , USA : CRC press .
- Zeng , K. , Yang , C. H. and Rao , T.R.N. 2001 . “Cryptanalysis of the Hwang‐Rao Secret Error‐Correcting Code Schemes” . Lecture Notes in Computer Science , 2229 : 419 – 428 .
- Zhang , M. 2000 . “Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers” . Journal of Cryptology , 13 ( 3 ) : 301 – 314 .
- Corresponding author. (Tel: 886–3–5131538; Fax: 886–3–5712385; Email: [email protected])