JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (9): 76-83.doi: 10.6040/j.issn.1671-9352.2.2015.221
Previous Articles Next Articles
CLC Number:
[1] HONSINGER C W, JONES P W, RABBAN I M, et al.Lossless recoveryof an original image containing embedded data: U.S. 6278791[P]. 2001-08-21. [2] MACQ B. Lossless multiresolution transform for image authenticatingwatermarking [J]. European Signal Processing Conference, 2000, 23(4):731-753. [3] FRIDRICH A J, GOLJAN M, DU R. Lossless data embedding for all image formats [J]. Electronic Imaging, 2002, 4675:572-583. [4] CELIK M U, SHARMA G, TEKALP A M, et al.Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2):253-266. [5] TIAN J. Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896. [6] THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3):721-730. [7] NI Z, SHI Y, ANSARI N, et al. Reversible data hiding[J]. IEEE Transactions on Circuitsand Systemsfor Video Technology, 2006, 16(3):354-362. [8] SACHNEV V, KIM H J, NAM J H, et al.Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuitsand Systems for Video Technology, 2009, 19(7):989-999. [9] LUO L, CHEN Z, CHEN M. Reversible imagewatermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):187-193. [10] COLTUC D. Improved embedding for prediction-based reversible watermarking[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):873-882. [11] LIX L, YANG B, ZENGT Y. Efficient reversible watermarkingbased on adaptive prediction-error expansion and pixel selection[J]. IEEE Transactions on Image Processing, 2011, 20(12):3524-3533. [12] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[J]. Proceedings of SPIE, 2008, 6819. [13] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258. [14] HONG W, CHENT S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202. [15] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[J]. International Workshop on Digital-Forensics and Watermark, 2012, 7809:384-394. [16] ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832. [17] QIAN Z, ZHANG X, WANG S.Reversible data hiding in encrypted JPEG bit stream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491. [18] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562. [19] COLTUC D, CHASSERY J M. High capacity reversible watermarking[J]. IEEE International Conference on Image Processing. Piscataway: IEEE, 2006: 2565-2568. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[3] | XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45. |
[4] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[5] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[6] | LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64. |
[7] | LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70. |
[8] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[9] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[10] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[11] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[12] | SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52. |
[13] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[14] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[15] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
|