全同态加密算法matlab,一种同态密文域可逆隐藏方案

[1] RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126.

[2] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C] //International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999:223-238.

[3] BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C] //Theory of Cryptography Conference. Berlin:Springer, 2005:325-341.

[4] BOS J W, LAUTER K, LOFTUS J, et al. Improved security for a ring-based fully homomorphic encryption scheme[C] //IMA International Conference on Cryptography and Coding. Berlin:Springer, 2013:45-64.

[5] TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Trans Circuits Syst Video Techn, 2003, 13(8):890-896.

[6] DRAGOI I C, COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4):1779-1790.

[7] CACIULA I, COLTUC D. Improved control for low bit-rate reversible watermarking[C] //2014 IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP). [S.l.] : IEEE, 2014: 7425-7429.

[8] ZHANG W, HU X, LI X, et al. Recursive histogram modification:establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 22(7):2775-2785.

[9] JARALI A, RAO J. Unique LSB Compression Data Hiding Method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3):17-21.

[10] LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(6):774-778.

[11] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12.

[12] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.

[13] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on information forensics and security, 2013, 8(3):553-562.

[14] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[C] //International Workshop on Digital Watermarking. Berlin: Springer, 2012:384-394.

[15] LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2):325-328.

[16] WU X, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal processing, 2014, 104:387-400.

[17] ZHANG X, WANG J, WANG Z, et al. Lossless and reversible data hiding in encrypted images with public key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2015, 26(9):1-1.

[18] QIAN Z, ZHANG X. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646.

[19] WU H T, DUGELAY J L, SHI Y Q. Reversible image data hiding with contrast enhancement[J]. IEEE Signal Processing Letters, 2015, 22(1):81-85.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值