1. Bodo, Y., Laurent, N., Degelay, J.-L.: A scrambling method based on disturbance of motion vector. In: Proceedings of ACM Multimedia 2002, Juan Le Pins, France, December 2003, pp. 89–90 (2003)
2. Cheng, H., Li, X.: On the application of image decomposition to image compression and encryption. In: Horster, P. (ed.) Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS 1996, Essen, Germany, pp. 116–127. Chapman & Hall, Boca Raton (September 1996)
3. Lecture Notes in Computer Science;J. Dittmann,1997
4. Dittmann, J., Steinmetz, R.: A technical approach to the transparent encryption of MPEG-2 video. In: Katsikas, S.K. (ed.) Communications and Multimedia Security, IFIP TC6/TC11 Third Joint Working Conference, CMS 1997, Athens, Greece, September 1997, pp. 215–226. Chapman and Hall, Boca Raton (1997)
5. Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Proceedings of the 4th 2004 Benelux Signal Processing Symposium, Hilvarenbeek, The Netherlands (April 2004), pp. 11–15 (2004)