1 |
SHI Y Q, LI X L, ZHANG X P, et al. Reversible data hiding: advances in the past two decades [J]. IEEE Access, 2016, 4: 3210-3237. 10.1109/access.2016.2573308
|
2 |
柯彦,张敏情,刘佳,等.密文域可逆信息隐藏综述[J].计算机应用,2016,36(11):3067-3076,3092. 10.11772/j.issn.1001-9081.2016.11.3067
|
|
KE Y, ZHANG M Q, LIU J, et al. Overview on reversible data hiding in encrypted domain [J]. Journal of Computer Applications, 2016, 36(11): 3067-3076, 3092. 10.11772/j.issn.1001-9081.2016.11.3067
|
3 |
ZHANG X P. Reversible data hiding in encrypted image [J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. 10.1109/lsp.2011.2114651
|
4 |
ZHANG X P. Separable reversible data hiding in encrypted image [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826-832. 10.1109/tifs.2011.2176120
|
5 |
GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. 10.1109/tcsvt.2018.2863029
|
6 |
顼聪,王兴田,陶永鹏.基于高阶位平面冗余的可逆信息隐藏方法[J].计算机应用,2022,42(1):171-177.
|
|
XU C, WANG X T, TAO Y P. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022,42(1): 171-177.
|
7 |
MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2014, 8(3): 553-562.
|
8 |
CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266. 10.1109/tip.2004.840686
|
9 |
THODI D M, RODRIGUEZ J J. Prediction-error based reversible watermarking [C]// Proceedings of the 2004 International Conference on Image Processing. Piscataway: IEEE, 2004: 1549-1552.
|
10 |
PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. 10.1109/TIFS.2018.2799381
|
11 |
KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain [C]// Proceedings of the 2016 International Workshop on Digital Watermarking, LNCS 10082. Cham: Springer, 2016: 470-484.
|
12 |
柯彦,张敏情,苏婷婷.基于R-LWE的密文域多比特可逆信息隐藏算法[J].计算机研究与发展,2016,53(10):2307-2322. 10.7544/issn1000-1239.2016.20160444
|
|
KE Y, ZHANG M Q, SU T T. A novel multiple bits reversible data hiding in encrypted domain based on R-LWE [J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. 10.7544/issn1000-1239.2016.20160444
|
13 |
HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process [J]. Signal Processing: Image Communication, 2020, 80: Article No.115632. 10.1016/j.image.2019.115632
|
14 |
CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. 10.1016/j.jvcir.2014.04.003
|
15 |
ZHANG X P, LONG J, WANG Z C, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622-1631. 10.1109/tcsvt.2015.2433194
|
16 |
WU X T, WENG J, YAN W Q, et al. Adopting secret sharing for reversible data hiding in encrypted images [J]. Signal Processing, 2018, 143: 269-281. 10.1016/j.sigpro.2017.09.017
|
17 |
CHEN Y C, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms [J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332-3343. 10.1109/tifs.2019.2914557
|
18 |
周能,张敏情,刘蒙蒙.基于秘密共享的同态加密图像可逆信息隐藏算法[J].科学技术与工程,20(19):7780-7786.
|
|
ZHOU N, ZHANG M Q, LIU M M. Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing [J]. Science Technology and Engineering, 2020, 20(19): 7780-7786.
|
19 |
CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991.
|
20 |
KE Y, ZHANG M Q, ZHANG X P, et al. Reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469-2481. 10.1109/tcsvt.2021.3081575
|
21 |
SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. 10.1145/359168.359176
|
22 |
THIEN C C, LIN J C. Secret image sharing [J]. Computers and Graphics, 2002, 26(5): 765-770. 10.1016/s0097-8493(02)00131-0
|
23 |
荣辉桂,莫进侠,常炳国,等.基于Shamir秘密共享的密钥分发与恢复算法[J].通信学报,2015,36(3):265-274. 10.11959/j.issn.1000-436x.2015083
|
|
RONG H G, MO J X, CHANG B G, et al. Key distribution and recovery algorithm based on Shamir’s secret sharing [J]. Journal on Communications, 2015, 36(3): 265-274. 10.11959/j.issn.1000-436x.2015083
|
24 |
吴燕仙,何妮.拉格朗日插值公式的完全展开[J].通化师范学院学报,2007,28(2):10-12. 10.3969/j.issn.1008-7974.2007.02.003
|
|
WU Y X, HE N. Complete expansion of Lagrange interpolation formula [J]. Journal of Tonghua Teachers College, 2007, 28(2): 10-12. 10.3969/j.issn.1008-7974.2007.02.003
|