[1] FRIDRICH J, GOLJAN M, DU R. Lossless data embedding for all images formats[C]//Electronic Imaging 2002. International Society for Optics and Photonics, 2002: 572-583. [2] KUNDUR D, KARTHIK K. Video fingerprinting and encryption principles for digital rights management [J]. Proceedings of the IEEE, 2004, 92(6): 918-932.[3] CELIK M U, SHARMA G, TEKALP A M. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.[4] THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Processing, 2007, 16(3): 721-730.[5] NI Z, SHI Y Q, ANSARI N. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362. [6] TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6): 906-910. [7] LUO L, CHEN Z, CHEN M, ZHENG X, XIONG Z. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 187-193.[8] LI X, YANG B, ZENG T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J]. IEEE Transactions on Image Processing, 2011, 20(12): 3524-3533.[9] HWANG K, LI D. Trusted cloud computing with secure resources and data coloring[J]. IEEE on Internet Computing, 2010, 14(5): 14-22.[10] ZHANG X. Reversible data hiding in encrypted image [J]. IEEE on Signal Processing Letters, 2011, 18(4): 255-258.[11] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match [J]. IEEE on Signal Processing Letters, 2012, 19(4): 199-202. [12] ZHANG X. Separable reversible data hiding in encrypted image[J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(2): 826-832.[13] ZHANG X, QIAN Z, FENG G, REN Y. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328.[14] QIAN Z, ZHANG X H X. Separable reversible data hiding in encrypted images by n-nary histogram modification [C]//The Third International Conference on Multimedia Technology, Atlantis Press, Paris. 2013: 869-876. [15] MA K, ZHANG W, ZHAO X, YU N. Reversible data hiding in encrypted images by reserving room before encryption [J]. Information Forensics and Security, IEEE Transactions on, 2013, 8(3): 553-562.[16] ZHANG W, MA K, YU N. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127.[17] ABDUL Karim M S, WONG K S. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94: 174-182.[18] WITTEN I H, NEAL R M, CLEARY J G. Arithmetic coding for data compression[J]. Communications of the ACM, 1987, 30(6): 520-540.[19] ZHANG D, WU X. An edge-guided image interpolation algorithm via directional filtering and data fusion[J]. IEEE Transactions on Image Processing, 2006, 15(8): 2226-2238. (编辑:管玉娟) |