[1] ZHANG Xinpeng.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258. [2] HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202. [3] ZHANG Xinpeng.Separable reversible data hiding in encrypted image[J].IEEE Transactions on Information Forensics and Security,2012,7(2):826-832. [4] MA Kede,ZHANG Weiming,ZHAO Xianfeng,et al.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics and Security,2013,8(3):553-562. [5] ZHANG Weiming,MA Kede,YU Nenghai.Reversibility improved data hiding in encrypted images[J].Signal Processing,2014,94:118-127. [6] QIAN Zhenxing,ZHANG Xinpeng,WANG Shouzhong.Reversible data hiding in encrypted JPEC bitstream[J].IEEE Transactions on Multimedia,2014,16(5):1486-1491. [7] NIU Xuejing,YIN Zhaoxia,ZHANG Xinpeng,et al.Reversible data hiding in encrypted AMBTC images[J].Multimedia Tools and Applications,2018,77(14):18067-18083. [8] CHEN Y C,SHIU C W,HORNG G.Encrypted signal-based reversible data hiding with public key cryptosystem[J].Journal of Visual Communication and Image Representation,2014,25(5):1164-1170. [9] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,1999:223-238. [10] SHIU C W,CHEN Y C,HONG W.Encrypted image-based reversible data hiding with public key cryptography from difference expansion[J].Signal Processing:Image Communication,2015,39:226-233. [11] WU Xiaotian,CHEN Bing,WENG Jian.Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer[J].Journal of Visual Communication and Image Representation,2016,41:58-64. [12] ZHANG Xinpeng,LONG Jing,WANG Zichi,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Transactions on Circuits and Systems for Video Technology,2016,26(9):1622-1631. [13] FRIDRICH J,GOLJAN M,LISONĚK P,et al.Writing on wet paper[J].IEEE Transactions on Signal Processing,2005,53(10):3923-3935. [14] XIANG Shijun,LUO Xinrong.Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J].Journal of Software,2016,27(6):1592-1601. [15] XIANG Shijun,LUO Xinrong.Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,28(11):3099-3110. [16] WU Xiaotian,WENG Jian,YAN Weiqi.Adopting secret sharing for reversible data hiding in encrypted images[J].Signal Processing,2018,143(1):269-281. [17] CHEN Y C,HUNG T H,HSIEH S H,et al.A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms[J].IEEE Tran-sactions on Information Forensics and Security,2019,14(12):3332-3343. [18] TIAN Jun.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [19] SHAMIR A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613. [20] FRANKLIN M,YUNG M.Communication complexity of secure computation (extended abstract)[C]//Proceedings of the 24th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1992:699-710. [21] WANG Z,BOVIK A C.A universal image quality index[J].IEEE Signal Processing Letters,2002,9(1):81-84. |