[1] Rivest R. The RC4 encryption algorithm[J]. RSA Data Security Inc, 1992, 20(1):86-96.
[2] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on Theory and Application of Cryptographic Techniques. Springer-Verlag, 1999:223-238.
[3] 丁玮,闫伟齐,齐东旭. 基于Arnold变换的数字图像置乱技术[J]. 计算机辅助设计与图形学学报,2001, 13(4):338-341. Ding W, Yan W Q, Qi D X. Digital image scrambling technology based on Arnold transformation[J]. Journal of Computer Aided Design & Computer Graphics, 2001, 13(4):338-341. (in Chinese)
[4] 向德生,熊岳山. 基于约瑟夫遍历的数字图像置乱算法[J]. 计算机工程与应用,2005, 41(10):44-46. Xiang D S, Xiong Y S. Digital image scrambling based on Josephus traversing[J]. Computer Engineering and Applications, 2005, 41(10):44-46. (in Chinese)
[5] 张贵仓,王让定,章毓晋. 基于迭代混合的数字图像隐藏技术[J]. 计算机学报,2003, 26(5):569-574. Zhang G C, Wang R D, Zhang Y J. Digital image information hiding technology based on iterative blending[J]. Chinese Journal of Computers, 2003, 26(5):569-574. (in Chinese)
[6] 丁玮. 数字图像信息安全的算法研究[D]. 北京:中国科学院计算技术研究所,2000.
[7] 吴军,吴秋新. 一种基于七巧板游戏的数字图像信息伪装方法[J]. 计算机应用,2004, 24(6):125-128. Wu J, Wu Q X. A steganography method of digital image information based on tangram[J]. Computer Applications, 2004, 24(6):125-128. (in Chinese)
[8] Lai I J, Tsai W H. Secret-fragment-visible mosaic image-a new computer art and its application to information hiding[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):936-945.
[9] Lee Y L, Tsai W H. A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2014, 24(4):695-703.
[10] Reinhard E, Ashikhmin M, Gooch B, Shirley P. Color transfer between images[J]. IEEE Computer Graphics & Applications, 2001, 21(5):34-41.
[11] Zhang W M, Wang H, Hou D D, Yu N H. Reversible data hiding in encrypted images by reversible image transformation[J]. IEEE Transactions on Multimedia, 2016, 18(8):1469-1479.
[12] Hou D D, Zhang W M, Yu N H. Image camouflage by reversible image transformation[J]. Journal of Visual Communication and Image Representation, 2016, 40:225-236.
[13] Sachnev V, Kim H J, Nam J, Suresh S, Shi Y Q. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2009, 19(7):989-999.
[14] BossBase image database,[DB]. http://agents.fel.cvut.cz/stegodata/RAWs/ |