JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (7): 104-110.doi: 10.6040/j.issn.1671-9352.2.2016.212
DING Yi-tao1, YANG Hai-bin1,2, YANG Xiao-yuan1,2*, ZHOU Tan-ping1
CLC Number:
[1] RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126. [2] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C] //International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999:223-238. [3] BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C] //Theory of Cryptography Conference. Berlin:Springer, 2005:325-341. [4] BOS J W, LAUTER K, LOFTUS J, et al. Improved security for a ring-based fully homomorphic encryption scheme[C] //IMA International Conference on Cryptography and Coding. Berlin:Springer, 2013:45-64. [5] TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Trans Circuits Syst Video Techn, 2003, 13(8):890-896. [6] DRAGOI I C, COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4):1779-1790. [7] CACIULA I, COLTUC D. Improved control for low bit-rate reversible watermarking[C] //2014 IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP). [S.l.] : IEEE, 2014: 7425-7429. [8] ZHANG W, HU X, LI X, et al. Recursive histogram modification:establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 22(7):2775-2785. [9] JARALI A, RAO J. Unique LSB Compression Data Hiding Method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3):17-21. [10] LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(6):774-778. [11] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12. [12] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258. [13] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on information forensics and security, 2013, 8(3):553-562. [14] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[C] //International Workshop on Digital Watermarking. Berlin: Springer, 2012:384-394. [15] LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2):325-328. [16] WU X, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal processing, 2014, 104:387-400. [17] ZHANG X, WANG J, WANG Z, et al. Lossless and reversible data hiding in encrypted images with public key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2015, 26(9):1-1. [18] QIAN Z, ZHANG X. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646. [19] WU H T, DUGELAY J L, SHI Y Q. Reversible image data hiding with contrast enhancement[J]. IEEE Signal Processing Letters, 2015, 22(1):81-85. |
[1] | WANG Wei-li, HU Bin, ZHAO Xiu-feng. An efficient multi-identity-based fully homomorphic encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 85-94. |
[2] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[3] | WU Zhi-jun,SHEN Dan-dan. Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 1-6. |
[4] | ZHANG Jing, XUE Leng, CUI Yi, RONG Hui, WANG Jian-ping. Modeling and evaluation of a dual chaotic encryption algorithm for WSN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(03): 1-5. |
[5] | KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149. |
[6] | HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49. |
|