[1] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258. [2] BARNI M, KALKER T, KATZENBEISSER S. Inspiring new research in the field of signal processing in the encrypted domain[J]. IEEE Signal Processing Magazine, 2013, 30(2):16. [3] ZHANG X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832. [4] 张敏情, 柯彦, 苏婷婷.基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2):354-360.(ZHANG M Q, KE Y, SU T T. Reversible steganography in encrypted domain based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2):354-360.) [5] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12. [6] ZHAO B, KOU W, LI H, et al. Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol[J]. Information Sciences, 2010, 180(23):4672-4684. [7] LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(6):774-778. [8] HONG W, CHEN T, WU H. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202. [9] YU J, ZHU G, LI X, et al. Digital forensics and watermarking:an improved algorithm for reversible data hiding in encrypted image[C]//IWDW 2012:Proceedings of the 11th International Conference on Digital Forensics and Watermaking. Berlin:Springer, 2014:384-394. [10] LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2):325-328. [11] WU X, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11):387-400. [12] QIAN Z, ZHANG X, WANG S. Reversible data hiding in encrypted JPEG bitstream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491. [13] LIAO X, SHU C. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. Journal of Visual Communication and Image Representation, 2015, 28(4):21-27. [14] KARIM M S A, WONG K S. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94(2):174-182. [15] 陈嘉勇, 王超, 张卫明. 安全的密文域图像隐写术[J]. 电子与信息学报, 2012, 34(7):1721-1726.(CHEN J Y, WANG C, ZHANG W M. A secure image steganographic method in encrypted domain[J]. Journal of Electronics & Information Technology, 2012, 34(7):1721-1726.) [16] ZHANG X P, LOONG J, WANG Z, et al. Lossless and reversible data hiding in encrypted images with public key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 26(9):1622-1631. [17] 项世军, 罗欣荣.基于同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报, 2016, 27(6):1592-1601.(XIANG S J, LUO X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601. [18] XIAO D, CHEN S. Separable data hiding in encrypted image based on compressive sensing[J]. Electronics Letters, 2014, 50(8):598-600. [19] REGEV O. On lattices, learning with errors, random linear codes and cryptography[J]. Journal of the ACM, 2009, 56(6):34. [20] 余位驰. 格基规约理论及其在密码设计中的应用[D]. 成都:西南交通大学, 2005:26-27.(YU W C. Lattice basis reduction thery and applications in crypto scheme designing[D]. Chengdu:Southwest Jiaotong University, 2005:26-27.) [21] REGEV O. The learning with errors problem[EB/OL].[2015-10-10]. http://www.cs.tau.ac.il/~odedr/papers/lwesurvey.pdf. [22] LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over rings[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2010:1-23. |