1. Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, New York (1996)
2. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, FL (1996)
3. Mao, W.: Modern cryptography: theory and practice. Prentice Hall PTR, Upper Saddle River (2003)
4. Wu, M.D.: Efficient and secure encryption schemes for JPEG2000. In: IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Montreal, Quebec, Canada, vol. 5, pp. 869–872 (2004)
5. Ali, S.T., Wu-chi, F.: Lightweight security mechanisms for wireless video transmission. Proc. IEEE Int. Conf. Information Technology: Coding and Computing, 157–161 (2001)