|
[1]
|
赵学军, 曹天宇, 李琳. 数字图像水印综述[J]. 工业控制计算机, 2025, 38(1): 108-110.
|
|
[2]
|
Li, H., Yang, Y., Dai, Y., Yu, S. and Xiang, Y. (2020) Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data. IEEE Transactions on Cloud Computing, 8, 484-494. [Google Scholar] [CrossRef]
|
|
[3]
|
Olaiya, O.P., Adesoga, T.O., Adebayo, A.A., et al. (2024) Encryption Techniques for Financial Data Security in Fintech Applications. International Journal of Science and Research Archive, 12, 2942-2949. [Google Scholar] [CrossRef]
|
|
[4]
|
Marcolla, C., Sucasas, V., Manzano, M., et al. (2022) Survey on Fully Homomorphic Encryption, Theory, and Applications. Proceedings of the IEEE, 110, 1572-1609.
|
|
[5]
|
Mahato, G.K. and Chakraborty, S.K. (2021) A Comparative Review on Homomorphic Encryption for Cloud Security. IETE Journal of Research, 69, 5124-5133. [Google Scholar] [CrossRef]
|
|
[6]
|
Bernstein, D.J. and Lange, T. (2017) Post-Quantum Cryptography. Nature, 549, 188-194. [Google Scholar] [CrossRef] [PubMed]
|
|
[7]
|
Liang, X., Xiang, S., Yang, L. and Li, J. (2021) Robust and Reversible Image Watermarking in Homomorphic Encrypted Domain. Signal Processing: Image Communication, 99, Article ID: 116462. [Google Scholar] [CrossRef]
|
|
[8]
|
Pillai, S.E.V.S. and Polimetla, K. (2024) Analyzing the Impact of Quantum Cryptography on Network Security. 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, 23-24 February 2024, 1-6. [Google Scholar] [CrossRef]
|
|
[9]
|
Azhari, R. and Salsabila, A.N. (2024) Analyzing the Impact of Quantum Computing on Current Encryption Techniques. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 5, 148-157. [Google Scholar] [CrossRef]
|
|
[10]
|
Jiang, L. (2018) The Identical Operands Commutative Encryption and Watermarking Based on Homomorphism. Multimedia Tools and Applications, 77, 30575-30594. [Google Scholar] [CrossRef]
|
|
[11]
|
Ren, N., Tong, D., Cui, H., Zhu, C. and Zhou, Q. (2022) Congruence and Geometric Feature-Based Commutative Encryption-Watermarking Method for Vector Maps. Computers & Geosciences, 159, Article ID: 105009. [Google Scholar] [CrossRef]
|
|
[12]
|
吕经浪, 李子臣. 基于Kyber的小数加法同态密码体制的研究[J]. 计算机技术与发展, 2024, 34(11): 101-108.
|
|
[13]
|
Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., et al. (2018). CRYSTALS-Kyber: A CCA-Secure Module-Lattice-Based KEM. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, 24-26 April 2018, 353-367.[CrossRef]
|
|
[14]
|
Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996) Techniques for Data Hiding. IBM Systems Journal, 35, 313-336. [Google Scholar] [CrossRef]
|
|
[15]
|
Jiang, L., Xu, Z. and Xu, Y. (2012) Commutative Encryption and Watermarking Based on Orthogonal Decomposition. Multimedia Tools and Applications, 70, 1617-1635. [Google Scholar] [CrossRef]
|
|
[16]
|
方立娇, 李子臣, 丁海洋. 基于ElGamal的同态交换加密水印算法[J]. 计算机系统应用, 2021, 30(5): 234-240.
|
|
[17]
|
项世军, 罗欣荣, 石书协. 一种同态加密域图像可逆水印算法[J]. 计算机学报, 2016, 39(3): 571-581.
|