| 1 | SHI Y Q, LI X L, ZHANG X P, et al. Reversible data hiding: advances in the past two decades [J]. IEEE Access, 2016, 4: 3210-3237.  10.1109/access.2016.2573308 | 
																													
																						| 2 | 柯彦,张敏情,刘佳,等.密文域可逆信息隐藏综述[J].计算机应用,2016,36(11):3067-3076,3092.  10.11772/j.issn.1001-9081.2016.11.3067 | 
																													
																						|  | KE Y, ZHANG M Q, LIU J, et al. Overview on reversible data hiding in encrypted domain [J]. Journal of Computer Applications, 2016, 36(11): 3067-3076, 3092.  10.11772/j.issn.1001-9081.2016.11.3067 | 
																													
																						| 3 | ZHANG X P. Reversible data hiding in encrypted image [J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.  10.1109/lsp.2011.2114651 | 
																													
																						| 4 | ZHANG X P. Separable reversible data hiding in encrypted image [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826-832.  10.1109/tifs.2011.2176120 | 
																													
																						| 5 | GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295.  10.1109/tcsvt.2018.2863029 | 
																													
																						| 6 | 顼聪,王兴田,陶永鹏.基于高阶位平面冗余的可逆信息隐藏方法[J].计算机应用,2022,42(1):171-177. | 
																													
																						|  | XU C, WANG X T, TAO Y P. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022,42(1): 171-177. | 
																													
																						| 7 | MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2014, 8(3): 553-562. | 
																													
																						| 8 | CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.  10.1109/tip.2004.840686 | 
																													
																						| 9 | THODI D M, RODRIGUEZ J J. Prediction-error based reversible watermarking [C]// Proceedings of the 2004 International Conference on Image Processing. Piscataway: IEEE, 2004: 1549-1552. | 
																													
																						| 10 | PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681.  10.1109/TIFS.2018.2799381 | 
																													
																						| 11 | KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain [C]// Proceedings of the 2016 International Workshop on Digital Watermarking, LNCS 10082. Cham: Springer, 2016: 470-484. | 
																													
																						| 12 | 柯彦,张敏情,苏婷婷.基于R-LWE的密文域多比特可逆信息隐藏算法[J].计算机研究与发展,2016,53(10):2307-2322.  10.7544/issn1000-1239.2016.20160444 | 
																													
																						|  | KE Y, ZHANG M Q, SU T T. A novel multiple bits reversible data hiding in encrypted domain based on R-LWE [J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322.  10.7544/issn1000-1239.2016.20160444 | 
																													
																						| 13 | HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process [J]. Signal Processing: Image Communication, 2020, 80: Article No.115632.  10.1016/j.image.2019.115632 | 
																													
																						| 14 | CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170.  10.1016/j.jvcir.2014.04.003 | 
																													
																						| 15 | ZHANG X P, LONG J, WANG Z C, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622-1631.  10.1109/tcsvt.2015.2433194 | 
																													
																						| 16 | WU X T, WENG J, YAN W Q, et al. Adopting secret sharing for reversible data hiding in encrypted images [J]. Signal Processing, 2018, 143: 269-281.  10.1016/j.sigpro.2017.09.017 | 
																													
																						| 17 | CHEN Y C, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms [J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332-3343.  10.1109/tifs.2019.2914557 | 
																													
																						| 18 | 周能,张敏情,刘蒙蒙.基于秘密共享的同态加密图像可逆信息隐藏算法[J].科学技术与工程,20(19):7780-7786. | 
																													
																						|  | ZHOU N, ZHANG M Q, LIU M M. Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing [J]. Science Technology and Engineering, 2020, 20(19): 7780-7786. | 
																													
																						| 19 | CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. | 
																													
																						| 20 | KE Y, ZHANG M Q, ZHANG X P, et al. Reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469-2481.  10.1109/tcsvt.2021.3081575 | 
																													
																						| 21 | SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.  10.1145/359168.359176 | 
																													
																						| 22 | THIEN C C, LIN J C. Secret image sharing [J]. Computers and Graphics, 2002, 26(5): 765-770.  10.1016/s0097-8493(02)00131-0 | 
																													
																						| 23 | 荣辉桂,莫进侠,常炳国,等.基于Shamir秘密共享的密钥分发与恢复算法[J].通信学报,2015,36(3):265-274.  10.11959/j.issn.1000-436x.2015083 | 
																													
																						|  | RONG H G, MO J X, CHANG B G, et al. Key distribution and recovery algorithm based on Shamir’s secret sharing [J]. Journal on Communications, 2015, 36(3): 265-274.  10.11959/j.issn.1000-436x.2015083 | 
																													
																						| 24 | 吴燕仙,何妮.拉格朗日插值公式的完全展开[J].通化师范学院学报,2007,28(2):10-12.  10.3969/j.issn.1008-7974.2007.02.003 | 
																													
																						|  | WU Y X, HE N. Complete expansion of Lagrange interpolation formula [J]. Journal of Tonghua Teachers College, 2007, 28(2): 10-12.  10.3969/j.issn.1008-7974.2007.02.003 |