暂无分享,去创建一个
Minqing Zhang | Jia Liu | Xinpeng Zhang | Xiaoyuan Yang | Yan Ke | Tingting Su | Xinpeng Zhang | Xiaoyuan Yang | Minqing Zhang | Tingting Su | Yan Ke | Jia Liu
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[3] Jian Weng,et al. Adopting secret sharing for reversible data hiding in encrypted images , 2018, Signal Process..
[4] Bing Chen,et al. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer , 2016, J. Vis. Commun. Image Represent..
[5] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[6] Di Xiao,et al. Reversible data hiding in encrypted images using cross division and additive homomorphism , 2015, Signal Process. Image Commun..
[7] W. Marsden. I and J , 2012 .
[8] Yang Li,et al. Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding , 2017, Signal Process..
[9] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[10] Pabbu Buchaiah,et al. Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2018 .
[11] Weiming Zhang,et al. Reversibility improved data hiding in encrypted images , 2014, Signal Process..
[12] Sung-Hsien Hsieh,et al. A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms , 2019, IEEE Transactions on Information Forensics and Security.
[13] M. R. Sayankar,et al. Secret sharing scheme for group authentication — A review , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).
[14] Xiaoyuan Yang,et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE , 2018, J. Vis. Commun. Image Represent..
[15] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[18] Zahra Ahmadian,et al. Linear Subspace Cryptanalysis of Harn’s Secret Sharing-Based Group Authentication Scheme , 2018, IEEE Transactions on Information Forensics and Security.
[19] Jiwu Huang,et al. Reversible data hiding in Paillier cryptosystem , 2016, J. Vis. Commun. Image Represent..
[20] Gang Qu,et al. Memristors for Secret Sharing-Based Lightweight Authentication , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[21] Kenneth G. Paterson,et al. On the Security of RC4 in TLS and WPA , 2013 .
[22] Marc Chaumont,et al. A reversible data hiding method for encrypted images , 2008, Electronic Imaging.
[23] Dipankar Dasgupta,et al. Shamir's Secret Sharing for Authentication without Reconstructing Password , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).
[25] Shijun Xiang,et al. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[26] Ming-Chun Chien,et al. Secret image sharing using (t,n) threshold scheme with lossless recovery , 2012, 2012 5th International Congress on Image and Signal Processing.
[27] Tingting Su,et al. Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[28] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[29] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[30] Dana Ron,et al. Chinese remaindering with errors , 1999, STOC '99.
[31] Yun-Qing Shi,et al. Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Arka Rai Choudhuri,et al. Two Round Information-Theoretic MPC with Malicious Security , 2019, IACR Cryptol. ePrint Arch..
[33] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[34] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[35] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[36] Yao Zhao,et al. Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[37] Jiwu Huang,et al. New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.
[38] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[39] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[40] Kenneth G. Paterson,et al. On the Security of RC4 in TLS , 2013, USENIX Security Symposium.
[41] Yicong Zhou,et al. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing , 2017, IEEE Transactions on Image Processing.
[42] Zhihua Xia,et al. High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption , 2018, IEEE Access.
[43] Yu-Chi Chen,et al. Encrypted image-based reversible data hiding with public key cryptography from difference expansion , 2015, Signal Process. Image Commun..
[44] Jia Liu,et al. Separable Multiple Bits Reversible Data Hiding in Encrypted Domain , 2016, IWDW.
[45] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.