[1] 张新鹏,殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志,2017,39(2):87-95. Zhang X P, Yin Z X, Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2):87-95. (in Chinese)
[2] Zhang X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(2):826-832.
[3] Qian Z X, Zhang X P, Wang S Z. Reversible data hiding in encrypted JPEG bitstream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491.
[4] Luo B, Li X L, Zhang W M. PVO-based reversible data hiding for encrypted images[C]//IEEE China Summit and International Conference on Signal and Information Processing. IEEE,2015:831-835.
[5] Zhang X P, Long J, Wang Z C, Cheng H. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(9):1622-1631.
[6] Qian Z X, Zhang X P. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(4):636-646.
[7] Qian Z X, Zhou H, Zhang X P, Zhang W M. Separable reversible data hiding in encrypted JPEG bitstreams[J]. IEEE Transactions on Dependable & Secure Computing, 2016(99):1-13.
[8] Yin Z X, Abel A, Tang J, Zhang X P, Luo B. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modifcation[J]. Multimedia Tools & Applications, 2017, 76(3):1-22.
[9] Yin Z X, Chang C C, Xu Q, Luo B. Second-order steganographic method based on adaptive reference matrix[J]. Image Processing Iet, 2014, 9(4):300-305.
[10] Long J, Yin Z X, Lv J P, Zhang X P. Rotation based reversible data hiding for JPEG images[J]. Iete Technical Review, 2016, 33(6):1-8.
[11] Ong S Y, Wong K S, Tanaka K. A scalable reversible data embedding method with progressive quality degradation functionality[J]. Signal Processing Image Communication, 2014, 29(1):135-149
[12] Karim M S A, Wong K. Universal data embedding in encrypted domain[M]. Elsevier NorthHolland, Inc. 2014, 94(1):174-182
[13] Rad R M, Wong K, Guo J M. A unifed data embedding and scrambling method[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2014, 23(4):1463-1475.
[14] Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2004, 13(4):600-612.
[15] Ma K D, Zhang W M, Zhao X F, Yu N H, Li F H. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(3):553-562.
[16] Kundur D, Karthik K. Video fngerprinting and encryption principles for digital rights management[J]. Proceedings of the IEEE, 2004, 92(6):918-932.
[17] Ong S Y, Wong K S, Tanaka K. Scrambling-embedding for JPEG compressed image[J]. Signal Processing, 2015, 109:38-53. |