[1] JOHNSON N F, JAJODIA S. Exploring steganography:seeing the unseen[J]. Computer, 1998, 31(2):26-34. [2] 孙圣和, 陆哲明, 牛夏牧. 数字水印技术及应用[M]. 北京:科学出版社, 2004:5-6.(SUN S H, LU Z M, NIU X M. Digital Watermarking Technology and Application[M]. Beijing:Science Press, 2004:5-6.) [3] 王丽娜,张焕国, 叶登攀,等. 信息隐藏技术与应用[M]. 武汉:武汉大学出版社, 2012:17-18.(WANG L N, ZHANG H G, YE D P, et al. Information Hiding Technology and Application[M]. Wuhan:Wuhan University Press, 2012:17-18.) [4] TIAN J. Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896. [5] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258. [6] SHI Y, LI X, ZHANG X, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016, 4:3210-3237. [7] RAJ T J, SIVADASAN E T. A survey paper on various reversible data hiding techniques in encrypted images[C]//Proceedings of the 2015 IEEE International Advance Computing Conference. Piscataway, NJ:IEEE, 2015:1139-1143. [8] 陈嘉勇, 王超, 张卫明,等.安全的密文域图像隐写术[J].电子与信息学报, 2012, 34(7):1721-1726. (CHEN J Y, WANG C, ZHANG W M, et al. A secure image steganographic method in encrypted domain[J]. Journal of Electronics & Information Technology, 2012, 34(7):1721-1726.) [9] SUN Y, ZHANG X. A kind of covert channel analysis method based on trusted pipeline[C]//Proceedings of the 2011 International Conference on Electrical and Control Engineering. Piscataway, NJ:IEEE, 2011:5660-5663. [10] 殷赵霞.面向隐私保护的数字图像隐写方法研究[D].合肥:安徽大学, 2014:9-12.(YIN Z X. Privacy protection oriented image steganography[D]. Hefei:Anhui University, 2014:9-12.) [11] BARNI M, KALKER T, KATZENBEISSER S. Inspiring new research in the field of signal processing in the encrypted domain[J]. IEEE Signal Processing Magazine, 2013, 30(2):16. [12] DRAGOI L, COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4):1779-1790. [13] CACIULA I, COLTUC D. Improved control for low bit-rate reversible watermarking[C]//Proceedings of the 2014 IEEE International Conference on Acoustics Speech and Signal Processing. Piscataway, NJ:IEEE, 2014:7425-7429. [14] ZHANG W, HU X, LI X, et al. Recursive histogram modification:establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 22(7):2775-2785. [15] JARALI A, RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3):17-21. [16] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12. [17] ZHAO B, KOU W, LI H, et al. Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol[J]. Information Sciences, 2010, 180(23):4672-4684. [18] LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J].IEEE Transactions on Circuits & Systems for Video Technology, 2007, 17(6):774-778. [19] XIAO D, CHEN S K. Separable data hiding in encrypted image based on compressive sensing[J]. Electronics Letters, 2014, 50(8):598-600. [20] ZHANG W, MA K, YU N. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94(1):118-127. [21] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on on Information Forensics and Security, 2013, 8(3):553-562. [22] LI M, XIAO D, ZHANG Y. Reversible data hiding in block compressed sensing images[J]. ETUI Journal, 2016, 38(1):159-163. [23] YAMAC M, DIKICI C, SANKUR B. Hiding data in compressive sensed measurements:a conditionally reversible data hiding scheme for compressively sensed measurements[J]. Digital Signal Processing, 2016, 48:188-200. [24] HONG W, CHEN T, WU H. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202. [25] YU J, ZHU G, LI X, et al. Digital forensics and watermarking:an improved algorithm for reversible data hiding in encrypted Image[C]//Proceedings of the 11th international conference on Digital Forensics and Watermaking. Berlin:Springer-Verlag, 2014:384-394. [26] WU X, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11):387-400. [27] QIAN Z, ZHANG X, WANG S. Reversible data hiding in encrypted JPEG bitstream[J].IEEE Transactions on Multimedia, 2014, 16(5):1486-1491. [28] LIAO X, SHU C. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. Journal of Visual Communication and Image Representation, 2015, 28(4):21-27. [29] LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2):325-328. [30] LI M, XIAO D, KULSOOM A, et al. Improved reversible data hiding for encrypted images using full embedding strategy[J]. Electronics Letters, 2015, 51(9):690-691. [31] FRIDRICH J, GOLJAN M, LISONEK P. Writing on wet paper[J]. IEEE Transactions on Signal Processing,2005, 53(10):3923-3935. [32] ZHANG X, WANG S. Dynamical running coding in digital steganography[J]. IEEE Signal Processing Letters, 2006, 13(3):165-168. [33] ZHANG X, WANG S. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communication Letters, 2006, 13(3):165-168. [34] LEE I-S, TSAI W. Data hiding in grayscale images by dynamic programming based on a human visual model[J]. Pattern Recognition, 2009, 42(7):1604-1611. [35] ZHANG X, QIAN Z, FENG G, et al. Efficient reversible data hiding in encrypted image[J]. Journal of Visual Communication and Image Representation, 2014,25(2):322-328. [36] KARIM M S A, WONG K. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94(2):174-182. [37] KURIBAYASHI M, TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12):2129-2139. [38] MEMON N, WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4):643-649. [39] OKAMOTO. T, UCHIYAMA. S. A new public-key cryptosystem as secure as factoring[C]//Proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1998:308-318. [40] FRIDRICH J, GOLJAN M, SOUKAL D. Efficient wet paper codes[C]//Proceedings of the 7th International Workshop on Information Hiding, LNCS 3727. Berlin:Springer, 2005:204-218. [41] DIJK M V, GENTRY C, HALEVI S, et al. Fully homomorphic encryption over the integers[C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer-Verlag, 2010:24-43. [42] CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5):1164-1170. [43] ZHANG X P, LOONG J, WANG Z, et al. Lossless and reversible data hiding in encrypted images with public key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 26(9):1622-1631. [44] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, LNCS 1592. Berlin:Spring-Verlag, 1999:223-238. [45] 项世军,罗欣荣.同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报, 2016, 27(6):1592-1601.(XIANG S J, LUO X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601.) [46] ZHANG X. Commutative reversible data hiding and encryption[J]. Security and Communication Networks, 2013, 6(11):1396-1403. [47] LI M, XIAO D, ZHANG Y, et al. Reversible data hiding in encrypted images using cross division and additive homomorphism[J]. Signal Processing:Image Communication, 2015,39:34-248 [48] ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):826-832. [49] 张敏情, 柯彦, 苏婷婷.基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2):354-360.(ZHANG M Q, KE Y, SU T T. Reversible steganography in encrypted domain based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2):354-360.) [50] YIN Z, LUO B, HONG W. Separable and error-free reversible data hiding in encrypted imgae with high payload[J]. The Scientific World Journal, 2014,1:1-8. [51] 李名.信息熵视角下的密文图像信息隐藏研究[D].重庆:重庆大学,2014. (LI M. Study on data hiding in encrypted images from the perspective of information entropy[D]. Chongqing:Chongqing University,2014.) |