[1] 冯登国, 张敏, 张妍, 等.云计算安全研究[J]. 软件学报, 2011, 22(1):71-83.(FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.) [2] 冯登国, 张敏, 李昊. 大数据安全与隐私保护[J]. 计算机学报, 2014, 37(1):246-258.(FENG D G, ZHANG M, LI H. Big data security and privacy protection[J]. Chinese Journal of Computers, 2014, 7(1):246-258.) [3] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258. [4] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202. [5] ZHANG X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832. [6] WU X T, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(6):387-400. [7] ZHANG W M, MA K D, YU N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94(1):118-127. [8] MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562. [9] CAO X C, DU L, WEI X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5):1132-1142. [10] LIAO X, SHU C W. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. Journal of Visual Communication and Image Representation, 2015, 28(4):21-27. [11] 殷赵霞.面向隐私保护的数字图像隐写方法研究[D]. 合肥:安徽大学, 2014:43-55.(YIN Z X. Privacy protection oriented image steganography[D]. Hefei:Anhui University, 2014:43-55.) [12] SHI Y, LI X, ZHANG X, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016, 4:3210-3237. [13] RAJ T J, SIVADASAN E T. A survey paper on various reversible data hiding techniques in encrypted images[C]//Proceedings of the 2015 IEEE International Advance Computing Conference. Piscataway, NJ:IEEE, 2015:1139-1143. [14] LIAO X, QING Z, DING L P. Data embedding in digital images using critical functions[J]. Signal Processing:Image Communication, 2017, 58:146-156. [15] QIN C, ZHANG X P. Effective reversible data hiding in encrypted image with privacy protection for image content[J]. Journal of Visual Communication and Image Representation, 2015, 31:154-164. [16] QIAN Z, ZHANG X P, WANG S. Reversible data hiding in encrypted JPEG bitstream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491. [17] MA B, SHI Y Q. A reversible data hiding scheme based on code division multiplexing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9):256-265. [18] 季春风.基于CDMA的图像数字水印算法的研究[D]. 济南:山东师范大学, 2010:16-24.(JI C F. Research on image watermarking algorithm base on CDMA[D]. Jinan:Shandong Normal University, 2010:16-24.) [19] 向德生, 熊岳山.基于约瑟夫遍历的数字图像置乱算法[J]. 计算机工程与应用, 2005, 41(10):44-46.(XIANG D S, XIONG Y S. Digital image scrambling based on Josephus traversing[J]. Computer Engineering and Applications, 2005, 41(10):44-46.) |