Reversible Data Hiding in Encrypted Image based on Homomorphic Public Key Cryptosystem
暂无分享,去创建一个
[1] Tung-Shou Chen,et al. Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping , 2013, ICSI.
[2] Zhang Min,et al. Study on Cloud Computing Security , 2011 .
[3] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[4] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[5] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[8] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[9] Xinpeng Zhang,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..
[12] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[13] Mache Creeger,et al. Cloud Computing: An Overview , 2009, ACM Queue.
[14] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[15] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[16] Miroslav Goljan,et al. Writing on wet paper , 2005 .
[17] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[18] Judith Hurwitz,et al. Cloud Computing for Dummies , 2009 .
[19] Zheng Hong-yin. Novel reversible data embedding algorithm for encrypted image , 2014 .
[20] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.