JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 1-8,18.doi: 10.6040/j.issn.1671-9352.2.2019.021
Min-qing ZHANG(),Neng ZHOU*(),Meng-meng LIU,Han WANG,Yan KE
CLC Number:
1 |
柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444 |
KE Yan , ZHANG Minqing , SU Tingting . A novel multiple bits reversible data hiding in encrypted domain based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444 |
|
2 | BARTON J M. Method and apparatus for embedding authentication information within digital data[P]. U.S. Patent 5646997.1997-07-08. |
3 |
ZHANG Xinpeng . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18 (4): 255- 258.
doi: 10.1109/LSP.2011.2114651 |
4 |
CHEN Yuchi , SHIU Chihwei , HORNG Gwoboa . Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25 (5): 1164- 1170.
doi: 10.1016/j.jvcir.2014.04.003 |
5 | PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1999: 223-238. |
6 | SHIU Chihwei , CHEN Yuchi , HONG Wien . Encrypted image-based reversible data hiding with public key cryptography from difference expansion[J]. Signal Processing: Image Communication, 2015, 39 (4): 226- 233. |
7 | 张敏情, 李天雪, 狄富强, 等. 基于Paillier同态公钥加密系统的可逆信息隐藏算法[J]. 郑州大学学报(理学版), 2018, 50 (1): 8- 14. |
ZHANG Minqing , LI Tianxue , DI Fuqiang , et al. Reversible data hiding algorithm based on Paillier homomorphic public key encryption system[J]. Journal of Zhengzhou University (Natural Science Edition), 2018, 50 (1): 8- 14. | |
8 |
XIANG Shijun , LUO Xinrong . Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28 (11): 3099- 3110.
doi: 10.1109/TCSVT.2017.2742023 |
9 |
MA Kede , ZHANG Weiming , ZHAO Xianfeng , et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (3): 553- 562.
doi: 10.1109/TIFS.2013.2248725 |
10 |
LUO Lixin , CHEN Zhenyong , CHEN Ming , et al. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5 (1): 187- 193.
doi: 10.1109/TIFS.2009.2035975 |
11 | 杨晓元, 魏立线. 计算机密码学[M]. 西安: 西安交通大学出版社, 2015: 77- 85. |
YANG Xiaoyuan , WEI Lixian . Computer cryptography[M]. Xi'an: Xi'an Jiaotong University Press, 2015: 77- 85. | |
12 |
ZHANG Xinpeng , LONG Jing , WANG Zichi , et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26 (9): 1622- 1631.
doi: 10.1109/TCSVT.2015.2433194 |
[1] | . Reversible data hiding in encrypted image based on an integer transform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 76-83. |
|