Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240900030-8.doi: 10.11896/jsjkx.240900030
• Information Security • Previous Articles Next Articles
LIU Runjun1, XIAO Fengjun2, HU Weitong2, WANG Xu3
CLC Number:
[1]LI CG,HAN Z Z,ZHANG,H R.Image encryption techniques:A servey[J].Journal of Computer Research and Development,2002,10:1317-1324. [2]TAI W L,YEH C M,CHANG C C.Reversible data hidingbased on histogram modification of pixel differences[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910. [3]TIAN,J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [4]HU Y J,LEE H K,CHEN K,et al.Difference expansion based reversible data hiding using two embedding directions[J].IEEE Transactions on Multimedia,2008,10(8):1500-1512. [5]KIM H J,SACHNEV V,SHI Y Q,et al.A novel difference expansion transform for reversible data embedding[J].IEEE Transactions on Information Forensics and Security,2008,3(3):456-465. [6]HONG W.Adaptive reversible data hiding method based on error energy control and histogram shifting[J].Optics Communications,2012,285(2):101-108. [7]LI X L,LI B,YANG B,et al.General framework to histogram-shifting-based reversible data hiding[J].IEEE Transactions on Image Processing,2013,22(6):2181-2191. [8]ZHANG W M,HU X C,LI X L,et al.Recursive histogrammodification:establishing equivalency between reversible data hiding and lossless data compression[J].IEEE Transactions on Image Processing,2013,22(7):2775-2785. [9]QU X C,HYOUNG J K.Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding[J].Signal Proces-sing,2015,111:249-260. [10]WENG S W,SHI Y Q,HONG W,et al.Dynamic improvedpixel value ordering reversible data hiding[J].Information Scien-ces,2019,489:136-154. [11]OU B,LI X L,ZHAO Y,et al.Pairwise prediction-error expansion for efficient reversible data hiding[J].IEEE Transactions on Image Processing,2013,22(12):5010-5021. [12]CHEN J Y,WANG C,ZHANG W M,et al.Secure ciphertext domain image steganography[J].Journal of Electronics & Information Technology,2012,34(7):1721-1726. [13]MA K D,ZHANG W M,ZHAO X F,et al.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics and Security,2013,8(3):553-562. [14]XIAO D,XIANG Y P,ZHENG H Y,et al.Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism[J].Journal of Visual Communication and Image Representation,2017,45:1-10. [15]CAO X C,DU L,WEI X X,et al.High capacity reversible data hiding in encrypted images by patch-level sparse representation[J].IEEE Transactions on Cybernetics,2015,46(5):1132-1143. [16]PUTEAUX P,WILLIAM P.An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681. [17]PUTEAUX P,WILLIAM P.A recursive reversible data hiding in encrypted images method with a very high payload[J].IEEE Transactions on Multimedia,2020,23:636-650. [18]YIN ZX,XIANG Y Z,ZHANG X P.Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J].IEEE Transactions on Multimedia,2019,22(4):874-884. [19]YI S,ZHOU Y C.Binary-block embedding for reversible data hiding in encrypted images[J].Signal Processing,2017,133:40-51. [20]CHEN K M,CHANG C C.High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J].Journal of Visual Communication and Image Representation,2019,58:334-344. [21]YI S,ZHOU Y C.Separable and reversible data hidingin encrypted images using parametric binary tree labeling[J].IEEETransactions on Multimedia,2018,21(1):51-64. [22]SHIU P F,TAI W L,JAN J K,et al.An interpolative AMBTC-based high-payload RDH scheme for encrypted images[J].Signal Processing:Image Communication,2019,74:64-77. [23]MOHAMMADI A,MANSOR N,MOHAMMAD A.A high-capacityreversible data hiding in encrypted images employing local difference predictor[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,30(8):2366-2376. [24]ZHANG X Q,HE F Y,YU C Q,et al.Reversible Data Hiding in Encrypted Images with Asymmetric Coding and Bit-plane Block Compression[J].IEEE Transactions on Multimedia,2024,26:10174-10188. [25]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing etters,2011,18(4):255-258. [26]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202. [27]ZHANG X P.Separable reversible data hiding in encryptedimage[J].IEEE Transactions on Information Forensics and Security,2011,7(2):826-832. [28]WU X T,WEI S.High-capacity reversible data hiding in encrypted images by prediction error[J].Signal Processing,2014,104:387-400. [29]QIAN Z X,ZHANG X P.Reversible data hiding in encrypted images with distributed source encoding[J].IEEE Transactions on Circuits and Systems forVideo Technology,2015,26(4):636-646. [30]YU M J,YAO H,QIN C.Reversible data hiding in encrypted images without additional information transmission[J].Signal Processing:Image Communication,2022,105:116696. [31]WANG X,CHANG C C,LIN C C,et al.Reversal of pixel rotation:A reversible data hiding system towards cybersecurity in encrypted images[J].Journal of Visual Communication and Image Representation,2022,82:103421. [32]GAO K,HORNG J H,CHANG C C.Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications[J].Displays,2024,81:102609. [33]GE H L,CHENY,QIAN Z X,et al.A high capacity multi-level approach for reversible data hiding in encrypted images[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,29(8):2285-2295. [34]QIN C,QIAN X K,HONG W,et al.An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer[J].Information Sciences,2019,487:176-192. [35]WANG X,CHANG C C,LIN C C.Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J].Information Sciences,2021,567:375-394. [36]LIU Y,YANG B L,ZHAO W Q,et al.Adaptive pixel block re-ference value based reversible data hiding in encrypted domain [J].Computer Science,2018,45(8):151-155. [37]SACHNEV V,KIM H J,NAM J,et al.Reversible watermar-king algorithm using sorting and prediction[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(7):989-999. [38]BAS P,TOMÁŠ F,TOMÁŠ P.Break our steganographicsys-tem:the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding.Berlin,Heidelberg:Springer Berlin Heidelberg,2011. [39]BAS P,FURON T.Image dataset of BOWS-2[EB/OL].(2017-06-20)[2019-05-16].http://bows2.ec-lille.fr/. |
[1] | WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7. |
[2] | YUAN Lin, HUANG Ling, HAO Kaile, ZHANG Jiawei, ZHU Mingrui, WANG Nannan, GAO Xinbo. Adversarial Face Privacy Protection Based on Makeup Style Patch Activation [J]. Computer Science, 2025, 52(6): 405-413. |
[3] | CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao. Survey of Personalized Location Privacy Protection Technologies [J]. Computer Science, 2025, 52(5): 307-321. |
[4] | ZHENG Xu, HUANG Xiangjie, YANG Yang. Reversible Facial Privacy Protection Method Based on “Invisible Masks” [J]. Computer Science, 2025, 52(5): 384-391. |
[5] | LIU Yuming, DAI Yu, CHEN Gongping. Review of Federated Learning in Medical Image Processing [J]. Computer Science, 2025, 52(1): 183-193. |
[6] | FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404. |
[7] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[8] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
[9] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[10] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[11] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[12] | YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377. |
[13] | WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339. |
[14] | SUN Min, LI Xinyu, ZHANG Xin. Study on Identity Authentication Scheme of Alliance Chain Based on Multi-level Commitment Protocol [J]. Computer Science, 2024, 51(11A): 240200079-7. |
[15] | LIU Yuanlong, DAI Hua, LI Zhangchen, ZHOU Qian, YI Xun, YANG Geng. Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey [J]. Computer Science, 2024, 51(11): 298-306. |
|