RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing
暂无分享,去创建一个
[1] Yicong Zhou,et al. Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders , 2020, IEEE Transactions on Dependable and Secure Computing.
[2] Yuliang Lu,et al. Robust Secret Image Sharing Resistant to Noise in Shares , 2021, ACM Trans. Multim. Comput. Commun. Appl..
[3] Deepak Puthal,et al. Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service , 2020, ACM Trans. Multim. Comput. Commun. Appl..
[4] Yaomin Wang,et al. High Capacity Reversible Data Hiding in Encrypted Image Based on Intra-Block Lossless Compression , 2021, IEEE Transactions on Multimedia.
[5] Yaomin Wang,et al. High-Fidelity Reversible Image Watermarking Based on Effective Prediction Error-Pairs Modification , 2021, IEEE Transactions on Multimedia.
[6] Suyel Namasudra,et al. Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment , 2020, ACM Trans. Multim. Comput. Commun. Appl..
[7] Yuliang Lu,et al. Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.
[8] Singhamit Kumar,et al. Data Hiding: Current Trends, Innovation and Potential challenges , 2020 .
[9] Tingting Su,et al. Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding , 2018, IEEE Transactions on Multimedia.
[11] Lizhi Xiong,et al. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion , 2019, J. Inf. Secur. Appl..
[12] Franco Frattolillo,et al. A multiparty watermarking protocol for cloud environments , 2019, J. Inf. Secur. Appl..
[13] Sung-Hsien Hsieh,et al. A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms , 2019, IEEE Transactions on Information Forensics and Security.
[14] Jeng-Shyang Pan,et al. An Improved Integer Transform Combining with an Irregular Block Partition , 2019, Symmetry.
[15] Shijun Xiang,et al. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Yicong Zhou,et al. Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..
[17] Jian Weng,et al. Adopting secret sharing for reversible data hiding in encrypted images , 2018, Signal Process..
[18] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[19] Eko Hari Rachmawanto,et al. A secure image watermarking using Chinese remainder theorem based on haar wavelet transform , 2017, 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE).
[20] Egia Rosi Subhiyakto,et al. Imperceptible image watermarking based on Chinese remainder theorem over the edges , 2017, 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
[21] Jeng-Shyang Pan,et al. Optimal PPVO-based reversible data hiding , 2017, J. Vis. Commun. Image Represent..
[22] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[23] Xing Zhang,et al. Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.
[24] Jiwu Huang,et al. New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.
[25] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[26] Ioan-Catalin Dragoi,et al. Adaptive Pairing Reversible Watermarking , 2016, IEEE Transactions on Image Processing.
[27] Alan Anwer Abdulla,et al. Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography , 2015 .
[28] Pei-Yu Lin,et al. Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[29] Ioan-Catalin Dragoi,et al. On Local Prediction Based Reversible Watermarking , 2015, IEEE Transactions on Image Processing.
[30] Umari,et al. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Transactions on Information Forensics and Security.
[31] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..
[32] Junxing Zhang,et al. A digital watermarking algorithm based on Chinese remainder theorem , 2014, 2014 10th International Conference on Communications (COMM).
[33] Harin Sellahewa,et al. Steganography based on pixel intensity value decomposition , 2014, Sensing Technologies + Applications.
[34] Ioan-Catalin Dragoi,et al. Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.
[35] Rajat Subhra Chakraborty,et al. A generalized tamper localization approach for reversible watermarking algorithms , 2013, TOMCCAP.
[36] Bin Li,et al. General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[37] Yookun Cho,et al. A robust steganography-based software watermarking , 2012, RACS.
[38] Ioan-Catalin Dragoi,et al. Improved rhombus interpolation for reversible watermarking by difference expansion , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[39] Dinu Coltuc,et al. Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.
[40] Xuelong Li,et al. Lossless Data Embedding Using Generalized Statistical Quantity Histogram , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[41] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[42] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[43] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[44] Jeffrey J. Rodríguez,et al. Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[45] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[46] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[47] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.