[1] FRIDRICH J, GOLJAN M, DU R. Lossless data embedding for all images formats[C]//Electronic Imaging 2002. International Society for Optics and Photonics, 2002: 572-583.
[2] KUNDUR D, KARTHIK K. Video fingerprinting and encryption principles for digital rights management [J]. Proceedings of the IEEE, 2004, 92(6): 918-932.
[3] CELIK M U, SHARMA G, TEKALP A M. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.
[4] THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Processing, 2007, 16(3): 721-730.
[5] NI Z, SHI Y Q, ANSARI N. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362.
[6] TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6): 906-910.
[7] LUO L, CHEN Z, CHEN M, ZHENG X, XIONG Z. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 187-193.
[8] LI X, YANG B, ZENG T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J]. IEEE Transactions on Image Processing, 2011, 20(12): 3524-3533.
[9] HWANG K, LI D. Trusted cloud computing with secure resources and data coloring[J]. IEEE on Internet Computing, 2010, 14(5): 14-22.
[10] ZHANG X. Reversible data hiding in encrypted image [J]. IEEE on Signal Processing Letters, 2011, 18(4): 255-258.
[11] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match [J]. IEEE on Signal Processing Letters, 2012, 19(4): 199-202.
[12] ZHANG X. Separable reversible data hiding in encrypted image[J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(2): 826-832.
[13] ZHANG X, QIAN Z, FENG G, REN Y. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328.
[14] QIAN Z, ZHANG X H X. Separable reversible data hiding in encrypted images by n-nary histogram modification [C]//The Third International Conference on Multimedia Technology, Atlantis Press, Paris. 2013: 869-876. [15] MA K, ZHANG W, ZHAO X, YU N. Reversible data hiding in encrypted images by reserving room before encryption [J]. Information Forensics and Security, IEEE Transactions on, 2013, 8(3): 553-562.
[16] ZHANG W, MA K, YU N. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127.
[17] ABDUL Karim M S, WONG K S. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94: 174-182.
[18] WITTEN I H, NEAL R M, CLEARY J G. Arithmetic coding for data compression[J]. Communications of the ACM, 1987, 30(6): 520-540.
[19] ZHANG D, WU X. An edge-guided image interpolation algorithm via directional filtering and data fusion[J]. IEEE Transactions on Image Processing, 2006, 15(8): 2226-2238.
(编辑:管玉娟)