梁盼, 付永庆, 陶宝泉.基于H.264的DCT变换系数解码的FPGA实现[J].应用科技, 2010, 37 (2):20-23. ?LIANG Pan, FU Yongqing, TAO Baoquan. Implementation of H.264 IDCT algorithm based on FPGA[J]. Applied Science and Technology, 2010, 37 (2):20-23.?
[2]
Getting started with the MicroBlaze development kit ? spartan?3e 1600e edition ug258 (v1.2) april 24, 2007[EB/OL] http://china.xilinx.com/.?
[3]
Digilent VDEC1 video decoder board.[EB/OL].[2011-05-10]http://www.digilentinc.com/Products/Detail.cfm?NavPath=2,648,415&Prod=VDEC1.?
[4]
薛小刚,葛毅敏. Xilinx ISE9.X PFGA/CPLD设计指南[M]. 北京:人民邮电出版社,2007. ?XUE Xiaogang, GE Yimin. The design guide of PFGA/CPLD by Xilinx ISE9.X[M]. Beijing: Posts and Telecom Press,2007. ?
[5]
PetaLinux User Guide [EB/OL].[2011-05-10]. http://developer. petalogix.com/#PetaLinuxDocumentation. ?
[6]
MAO Yaobin, CHEN Guanrong, LIAN Shiguo. A novel fast image encryption scheme based on 3D chaotic Baker maps[J]. International Journal of Bifurcation and Chaos, 2004, 14(10):3613-3624.?
[7]
CHEN Guanrong, MAO Yaobin, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons and Fractals , 2004, 21: 749-761.?
[8]
ALVAREZ G, LI S. Some basic cryptographic requirements for chaos?based cryptosystems[J]. International Journal of Bifurcation and Chaos, 2006, 16(8): 2129-2151. ?
[9]
张萌, 刘忠信, 孙青林,等. Chaotic video encryption algorithm based on Baker map [J].中国图像图形学报, 2006, 9 (11):441-445. ?ZHANG Meng, LIU Zhongxin, SUN Qinglin,et al. Chaotic video encryption algorithm based on Baker map [J]. Journal of Image and Graphics, 2006, 9 (11):441-445.?
[10]
CHIARALUCE F, CICCARELLI L, GAMBI E, et al. A new chaotic algorithm for video encryption[J]. IEEE Transactions on Consumer Electronics, 2002, 48(4): 838-844?
[11]
LIU Fuwen,HARTMUT K.A survey of video encryption algorithms[J].Computers & Security,2010, 29(1):3-15.?
[12]
QIAO L, NAHRSTEDT K. Comparison of MPEG encryption algorithms[J]. International Journal on Computers & Graphics, 1996, 22(3): 219-230.?
[13]
QIAO L, NAHRSTEDT K, TAM M C. Is MPEG encryption by using random list instead of zigzag order secure?[C]// IEEE International Symposium on Consumer Electronics, Singapore, 1997:226-229.?
[14]
TANG L. Methods for encrypting and decrypting MPEG video data efficiently[C]// Proceedings of the 4th ACM International Conference on Multimedia. New York: ACM, 1996: 219 - 230.?
[15]
ALATTAR A M, AL?REGIB G I. Evaluation of selective encryption techniques for secure transmission of MPEG2 compressed bit streams [C]// Proceedings of the 1999 IEEE International Symposium on Circuits and Systems. Washington: IEEE, 1999: 340- 343.?
[16]
FRIDRICH J R. Symmetric ciphers based on two dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.?
[17]
KANSO A, SMAOUI N. Logistic chaotic maps for binary numbers generations[J]. Chaos, Solitons & Fractals, 2009, 40 (5), 2557-2568.?
[18]
LI Yuxia, WALLACE K S T, CHEN Guanrong. Generating hyperchaos via state feedback control[J]. International Journal of Bifurcation and Chaos, 2005, 15(10): 3367-3375.