REFERENCES
- Lin, E. I., Eskicioglu, A. M., Lagendijk, R. L. and Delp, E. J. Advances in digital video content protection. Proc. IEEE, 2005, 93, 171–183.
- Lee, W.-B., Chen, T.-H. and Lee, C.-C. Security of new encryption algorithm for image cryptosystems. Imag. Sci. J., 2006, 54, 178–187.
- Cox, I. J., Miller, M. L. and Bloom, J. A. Digital Watermarking, 2002 (Morgan-Kaufmann, San Francisco).
- Chang, M.-C., Lou, D.-C. and Tso, H.-K. Combined watermarking and fingerprinting technologies for digital image copyright protection. Imag. Sci. J., 2007, 55, 3–12.
- Kundur, D. and Karthik, K. Video fingerprinting and encryption principles for digital rights management. Proc. IEEE, 2004, 92, 918–932.
- Lian, S., Liu, Z., Ren, Z. and Wang, H. Commutative encryption and watermarking in compressed video data. IEEE Circuits Sys. Video Technol., 2007, 17, 774–778.
- Boneh, D. and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory, 1998, 44, 1897–1905.
- Wu, M., Trappe, W., Wang, Z. J. and Liu, R. Collusion-resistant fingerprinting for multimedia. IEEE Signal Process. Magaz., 2004, 21, 15–27.
- Zhao, H. V. and Liu, K. J. R. Fingerprint multicast in secure video streaming. IEEE Trans. Image Process., 2006, 15, 12–29.
- Simitopoulos, D., Zissis, N., Georgiadis, P., Emmanouilidis, V. and Strintzis, M. G. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD’, ACM Multimedia Sys. J., Special Issue on Multimedia Security, 2003, 9, 217–227.
- Brown, I., Perkins, C. and Crowcroft, J. Watercasting: distributed watermarking of multicast media. Proc. 1st Int. Workshop on Networked Group Communication, Lecture Notes in Computer Science, Pisa, Italy, November 1999, Springer-Verlag, Vol. 1736, pp. 286–300.
- Bloom, J. Security and rights management in digital cinema. Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, Hong Kong, China, April 2003, IEEE Computer Society, Vol. 4, pp. 712–715.
- Anderson, R. and Manifavas, C. Chamleon – a new kind of stream cipher. Lecture Notes in Computer Science, Fast Software Encryption, 1997, Vol. 1267, pp. 107–113 (Springer-Verlag, Berlin).
- Lian, S., Liu, Z., Ren, Z. and Wang, H. Secure distribution scheme for compressed data streams. Proc. IEEE Conf. on Image processing, Atlanta, GA, USA, October 2006, IEEE Computer Society, pp. 1953–1956.
- Lemma, A. N., Katzenbeisser, S., Celik, M. U. and Veen, M. V. Secure watermark embedding through partial encryption. Proc. Int. Workshop on Digital watermarking, Jeju Island, Korea, November 2006, Springer, Vol. 4283, pp. 433–445.
- Cox, I., Kilian, J., Leighton, F. and Shamoon, F. Secure spread spectrum watermarking for multimedia. IEEE Trans. Imag. Process., 1997, 6, 1673–1687.
- Pennebaker, W. B. and Mitchell, J. L. JPEG Still Image Compression Standard, 1993 (Van Nostrand Reinhold, New York).
- Mollin, R. A. An Introduction to Cryptography, 2006 (CRC Press, Boca Raton, New York, London, Tokyo).
- Lee, H. and Moon, S. Parallel stream cipher for secure high-speed communications. Signal Process., 2002, 82, 259–265.
- Lian, S., Liu, Z., Ren, Z. and Wang, H. Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consumer Electron., 2006, 52, 621–629.
- Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140–1, 25 May 2001.
- Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Attack on copyright marketing systems. In: Information Hiding, 2nd Int. Workshop, IH’98, (Ed. D. Aucsmith), Portland, USA, April 1998, Portland, Oregon, USA, Lecture Notes in Computer Science, Vol. 1525, pp. 218–238 (Springer–Verlag, Berlin).