Computer Science ›› 2023, Vol. 50 ›› Issue (8): 294-303.doi: 10.11896/jsjkx.220800245
• Information Security • Previous Articles Next Articles
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
CLC Number:
[1]SHI Y Q,LI X L,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237. [2]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [3]NI Z C,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362. [4]PUECH W,CHAUMONT M,STRAUSS O.A reversible datahiding method for encrypted images[C]//Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.SPIE,2008:534-542. [5]HUANG F J,HUANG J W,SHI Y Q.New framework for reversible data hiding in encrypted domain[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2777-2789. [6]PUTEAUX P,PUECH W.An efficient msb prediction-basedmethod for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681. [7]YI S,ZHOU Y C.Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J].IEEE Transactions on Multimedia,2018,21(1):51-64. [8]YIN Z X,PENG Y Y,XIANG Y Z.Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J].IEEE Transactions on Dependable and Secure Computing,2020,19(2):992-1002. [9]WANG Y M,CAI Z C,HE W G.High capacity reversible data hiding in encrypted image based on intra-block lossless compression[J].IEEE Transactions on Multimedia,2020,23:1466-1473. [10]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive msb prediction[J].IEEE Transactions on Multimedia,2021,24:1288-1298. [11]YANG Y L,HE H J,CHEN F,et al.Reversible data hiding of image encrypted based on prediction error adaptive coding[J].Journal of Computer Research and Development,2021,58(6):1340-1350. [12]ZHANG X P,LONG J,WANG Z C,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Transactions on Circuits and Systems for Video Technology,2015,26(9):1622-1631. [13]XIANG S J,LUO X R.Efficient reversible data hiding in en-crypted image with public key cryptosystem[J].EURASIP Journal on Advances in Signal Processing,2017,2017(1):1-13. [14]XIONG L Z,DONG D P,XIA Z H,et al.High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption[J].IEEE Access,2018,6:60635-60644. [15]ZHOU N,ZHANG M Q,WANG H,et al.Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU[J].IEEE Access,2020,8:81412-81424. [16]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Reversible data hiding in homomorphic encrypted images without preproces-sing[C]//International Workshop on Information Security Application.Springer,2019:141-154. [17]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Lossless datahiding in encrypted images compatible with homomorphic proces-sing[J].IEEE Transactions on Cybernetic,2022,53(6):3688-3701. [18]CHEN B,WU X T,LU W,et al.Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism[J].Signal Processing,2019,164:48-57. [19]ZHOU N,ZHANG M Q,TANG H Q,et al.Reversible data hi-ding algorithm in encrypted domain based on NTRU[J].Science Technology and Engineering.2020,20(32):10. [20]REGEV O.On lattices,learning with errors,random linearcodes,and cryptography[J].Journal of the ACM(JACM),2009,56(6):1-40. [21]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Sprin-ger,1999:223-238. [22]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) Fully homomorphic encryption without bootstrapping[J].ACM Transactions on Computation Theory(TOCT),2014,6(3):1-36. [23]HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:A ring-based public key cryptosystem[C]//International Algorithmic Number Theory Symposium.Springer,1998:267-288. [24]FRIDRICH J,GOLJAN M,LISONEK,et al.Writing on wet paper[J].IEEE Transactions on Signal Processing,2005,53(10):3923-3935. [25]BONEH D,GOH E J,NISSIM K.Evaluating 2-dnf formulas on ciphertexts[C]//Theory of Cryptography Conference.Springer,2005:325-341. [26]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472. [27]WANG C,YAO H N,WANG B N,et al.Process in quantum computing cryptography attacks[J].Chinese Journal of Computers.2020,43(9):1691-1707. [28]AJTAI M.Generating hard instances of lattice problems[C]//Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing.1996:99-108. [29]SHORP W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM Review,1999,41(2):303-332. |
[1] | HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346. |
[2] | MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305. |
[3] | LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua. Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain [J]. Computer Science, 2018, 45(8): 151-155. |
[4] | XIANG Yu-dong and WU Gui-xing. Pixel Prediction Based Reversible Data Hiding Scheme for Image [J]. Computer Science, 2018, 45(2): 189-196. |
[5] | ZHANG Yao, PAN Feng, SHEN Jun-wei and LI Ning-bo. Adaptive Post-type Steganography Algorithm Based on MP3 [J]. Computer Science, 2016, 43(8): 114-117. |
[6] | XIE Jian-quan,XIE Qing and HUANG Da-zu. Image Information Hiding Algorithm with High Security Based on Run-length [J]. Computer Science, 2014, 41(3): 172-175. |
[7] | LUO Jian-gao and HAN Guo-qiang. Reversible Data Hiding Based on Full Context Prediction [J]. Computer Science, 2013, 40(Z11): 219-223. |
[8] | . Reversible Data Hiding Based on Reference Pixel of Block [J]. Computer Science, 2012, 39(2): 47-51. |
[9] | . Content-based Reversible Steganographic Method for Multimodal Biometrics [J]. Computer Science, 2012, 39(11): 70-74. |
|