|
[1]
|
傅楚君, 兰胜坤. 基于DCT变换的数字水印算法[J]. 网络安全技术与应用, 2020(7): 49-51.
|
|
[2]
|
胡坤, 李聪, 胡建平, 王小超, 杜玲, 王红飞. 基于BEMD与DCT的彩色图像多重水印鲁棒算法[J/OL]. 北京航空航天大学学报, 1-16.[CrossRef]
|
|
[3]
|
王东东, 王福明. 基于LSB数字水印算法的研究与实现[J]. 山西电子技术, 2014(5): 76-77.
|
|
[4]
|
Zhang, X. (2011) Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters, 18, 255-258. [Google Scholar] [CrossRef]
|
|
[5]
|
Chen, Y.C., Shiu, C.W. and Horng, G. (2014) Encrypted Signal-Based Reversible Data Hiding with Public Key Cryptosystem. Journal of Visual Communication and Image Representation, 25, 1164-1170. [Google Scholar] [CrossRef]
|
|
[6]
|
Ke, Y., Zhang, M. and Su, T. (2016) A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE. Journal of Computer Research & Development, 53, 2307-2322.
|
|
[7]
|
Zhou, N., Zhang, M.Q., Zhou, H.N., et al. (2020) Reversible Data Hiding Algorithm in Encrypted Domain Based on NTRU. Science Technology and Engineering, 20, 13285-13294. (in Chinese)
|
|
[8]
|
Zhou, N., Zhang, M., Wang, H., et al. (2020) Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access, 8, 81412-81424.
|
|
[9]
|
项世军, 罗欣荣, 石书协. 一种同态加密域图像可逆水印算法[J]. 计算机学报, 2016, 39(3): 571-581.
|
|
[10]
|
Paillier, P. (1999) Public-Key Cryptosystems Based on Discrete Logarithms Residues. Advances in Cryptology-Eu- rocrypt’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2-6 May 1999, 223-238.
|
|
[11]
|
Brakerski, Z. and Vaikuntanathan, V. (2014) Efficient Fully Homomorphic Encryption from (Standard) Lwe. 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97-106.
|
|
[12]
|
Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. STOC, 9, 169-178. [Google Scholar] [CrossRef]
|
|
[13]
|
Fan, J. and Vercauteren, F. (2012) Somewhat Practical Fully Homomorphic Encryption. Iacr Cryptology ePrint Archive, 2012, 144.
|
|
[14]
|
Hoffstein, J., Pipher, J. and Silverman, J.H. (1998) NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P., (Ed.), Algorithmic Number Theory, Springer, Heidelberg. [Google Scholar] [CrossRef]
|
|
[15]
|
Wu, H.T., Cheung, Y., Yang, Z., et al. (2019) A High-Capacity Reversible Data Hiding Method for Homomorphic Encrypted Images. Journal of Visual Communication and Image Representation, 62, 87-96. [Google Scholar] [CrossRef]
|
|
[16]
|
Ajtai, M. (1996) Generating Hard Instances of Lattice Problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, 1996, 99-108. [Google Scholar] [CrossRef]
|
|
[17]
|
Regev, O. (2009) On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. Journal of the ACM, 56, 1-40. [Google Scholar] [CrossRef]
|
|
[18]
|
Li, Z.C., Zhang, J.M., Yang, Y.T., et al. (2018) A Fully Homomorphic Encryption Scheme Based on NTRU. Agta Electronica Sinca, 46, 938-944. (in Chinese)
|