图像空域可逆信息隐藏研究进展
Review of reversible data hiding based on the spatial domain of images
- 2022年27卷第1期 页码:125-149
收稿:2021-04-26,
修回:2021-9-15,
录用:2021-9-22,
纸质出版:2022-01-16
DOI: 10.11834/jig.210292
移动端阅览

浏览全部资源
扫码关注微信
收稿:2021-04-26,
修回:2021-9-15,
录用:2021-9-22,
纸质出版:2022-01-16
移动端阅览
可逆信息隐藏是信息隐藏技术的重要分支,它不仅能从含密载体中提取秘密信息,还能无损地还原原始载体。以图像空域为载体的可逆信息隐藏研究根据图像是否被加密可分为明文域和密文域。早期,该领域研究基本在明文域开展,在保证可逆嵌入的前提下,着重提高嵌入容量与减少嵌入失真。随着人们日益重视隐私保护和数据安全,密文域的信号处理引起广泛关注。密文域可逆信息隐藏结合加密技术和可逆信息隐藏技术,从而达到载体内容保护和秘密信息传递的双重目的。本文梳理现有的相关文献,分别对明文域和密文域的研究进行归纳与分析,按照时间先后顺序帮助理清各类方法的发展脉络及其关联。首先,概括明文域的经典方法,包括差值扩展、直方图平移、预测误差扩展和多直方图修改4种方法及其改进版本。其次,阐述密文域中基于加密后腾出空间、加密前预留空间和通过加密腾出空间3类方法的研究进展。再次,总结指出明文域的研究趋向于减少嵌入失真,而密文域的研究趋向于提高嵌入容量,其在鲁棒性及安全性方面的进展则相对缓慢。最后,结合当前研究面临的实际问题,如载体多元化、有损信道传输和安全性等,进一步展望未来的研究趋势。总之,可逆信息隐藏研究的有效性与实用性仍有待提高,面向不同应用需求时,亟需学者提出新的理论支撑与评价体系。
Reversible data hiding (RDH) is one branch of data hiding technologies
which can extract the secret data from the marked carrier and recover the original carrier losslessly. In terms of the factor of reversible recovery
RDH has been implemented for media annotation and integrity authentication and integrated to other research aspects
such as reversible steganography
robust reversible watermarking
reversible adversarial samples
and reversible image transformation. In accordance with the content (encrypted or not) of image carrier
RDH can be divided into plaintext domain and encrypted domain each. At the beginning
the targeted research area was fundamentally conducted in plaintext domain. On the basis of ensuring reversible embedding
the improvement of embedding capacity and the decrease of embedding distortion have been mainly addressed. Signal processing in the encrypted domain has obtained extensive attention in privacy protection and data security. RDH in encrypted domain integrates encryption and reversible data hiding technology
aiming at realizing carrier content protection and covert communication simultaneously. The current research in plaintext domain and encrypted domain is summarized and analyzed to assist the readers with the knowhow in time sequence. First
the methods of plaintext domain have been summarized like four methods including difference expansion (DE)
histogram shifting (HS)
prediction error expansion (PEE)
and multiple histogram modification (MHM) and their upgraded versions. PEE is developed on the basis of DE
which has higher embedding capacity
while tends to increase embedding distortion at low embedding capacity. Another classical method HS is proposed to reduce the embedding distortion at low embedding capacity. Subsequently
PEE achieves a qualified balance between embedding capacity and embedding distortion via the shifting operation of HS on the histogram. Various prediction error generation methods and two-dimensional histogram modification can improve the performance of PEE. MHM divides the prediction errors of the image into multiple histograms. The performance is improved further via PEE application in each sub-histogram. The current high-fidelity methods of plaintext domain have basically evolved three steps as following: First
neighboring pixels are applied to calculate the prediction error. Next
cluster regions have generated multiple two-dimensional prediction error histograms via similar complexity. At last
mapping rules have been used in reversible modification to the histograms. Hence
accurate pixel value prediction
qualified histogram generation and adaptive mapping rules can be as the research strategies. The other aspect on the research progress of three types of methods in encrypted domain has been demonstrated
which are based on vacating room after encryption (VRAE)
reserving room before encryption (RRBE)
and vacating room by encryption (VRBE). The VRAE-based methods require the data hider to vacate embeddable room after encryption. The content owner has utilized the standard encryption algorithm to encrypt the original image straightforward
such as stream encryption
block encryption and homomorphic encryption. For the application of spatial correlation of the original image
the RRBE-based methods allow the content owner to perform some pre-processing before encryption. The content owner utilizes the special encryption algorithm to encrypt the original image via the VRBE-based methods. The local spatial correlation can be preserved in the encrypted image. The initial research in encrypted domain is mainly in accordance with the modifications of the least significant bits. These methods could obtain high-quality decrypted image
while they might not be able to restore the original image losslessly
and their embedding capacity is limited. Since the encrypted image itself is a unique noise signal
the modifications of the most significant bits could greatly increase the embedding capacity with ensuring completed reversibility. The research in plaintext domain tends to reduce the embedding distortion
while the research in encrypted domain tends to increase the embedding capacity
and their development in robustness and security is relatively slow. The evaluation of the current methods is mainly based on the rate-distortion performance in reversibility. As the algorithm complexity increases and the solution space expands
the computational cost also increases inevitably. The efficiency evaluation is a comparison of running time as usual. From the perspective of the development of RDH
it is not recommended to always seek breakthroughs in certain indicators. Scientific evaluation of the performance and efficiency can promote the co-development of various methods. In order to meet different application requirements
future research on RDH should not constrain to the balance between reversibility
embedding capacity
and imperceptibility. Computational cost
robustness
and security issues should be evolved.
Alattar A M. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8): 1147-1156 [DOI: 10.1109/TIP.2004.828418]
Barton J M. 1997. Method and apparatus for embedding authentication information within digital data. U.S. Patent, No. 5 646 997
Bobeica A, Dragoi I C, Caciula I, Coltuc D, Albu F and Yang F R. 2018. Capacity control for prediction error expansion based audio reversible data hiding//Proceedings of the 22nd International Conference on System Theory, Control and Computing. Sinaia, Romania: IEEE: 810-815 [ DOI: 10.1109/ICSTCC.2018.8540672 http://dx.doi.org/10.1109/ICSTCC.2018.8540672 ]
Calderbank A R, Daubechies I, Sweldens W and Yeo B L. 1998. Wavelet transforms that map integers to integers. Applied and Computational Harmonic Analysis, 5(3): 332-369 [DOI: 10.1006/acha.1997.0238]
Cao X C, Du L, Wei X X, Meng D and Guo X J. 2016. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics, 46(5): 1132-1143 [DOI: 10.1109/TCYB.2015.2423678]
Celik M U, Sharma G, Tekalp A M and Saber E. 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14(2): 253-266 [DOI: 10.1109/TIP.2004.840686]
Chang J, Ding F, Li X L and Zhu G P. 2021b. Hybrid prediction-based pixel-value-ordering method for reversible data hiding. Journal of Visual Communication and Image Representation, 77: #103097 [DOI: 10.1016/j.jvcir.2021.103097]
Chang Q, Li X L, Zhao Y and Ni R R. 2021a. Adaptive pairwise Prediction-error expansion and multiple histograms modification for reversible data hiding. IEEE Transactions on Circuitsand Systems for Video Technology, 31(12): 4850-4863 [DOI: 10.1109/TCSVT.2021.3055612]
Chen B, Lu W, Huang J W, Weng J and Zhou Y C. 2020. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders [J/OL]. IEEE Transactions on Dependable and Secure Computing, https://doi.org/10.1109/TDSC.2020.3011923 https://doi.org/10.1109/TDSC.2020.3011923
Chen F, Yuan Y, He H J, Tian M and Tai H M. 2021. Multi-MSB compression based reversible data hiding scheme in encrypted images. IEEE Transactions on Circuits and Systems for Video Technology, 31(3): 905-916 [DOI: 10.1109/TCSVT.2020.2992817]
Chen K M and Chang C C. 2019. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. Journal of Visual Communication and Image Representation, 58: 334-344 [DOI: 10.1016/j.jvcir.2018.12.023]
Chen Y C, Hung T H, Hsieh S H and Shiu C W. 2019. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Transactions on Information Forensics and Security, 14(12): 3332-3343 [DOI: 10.1109/TIFS.2019.2914557]
Chen Y C, Shiu C W and Horng G. 2014. Encrypted signal-based reversible data hiding with public key cryptosystem. Journal of Visual Communication and Image Representation, 25(5): 1164-1170 [DOI: 10.1016/j.jvcir.2014.04.003]
Coatrieux G, Le Guillou C, Cauvin J M and Roux C. 2009. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Transactions on Information Technology in Biomedicine, 13(2): 158-165 [DOI: 10.1109/TITB.2008.2007199]
Coltuc D. 2007. Towards distortion-free robust image authentication. Journal of Physics: Conterence Sevies, 77: #012005 [DOI: 10.1088/1742-6596/77/1/012005]
Coltuc D and Chassery J M. 2007. Distortion-free robust watermarking: a case study//Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents Ⅸ. San Jose, USA: SPIE: 65051N [ DOI: 10.1117/12.702445 http://dx.doi.org/10.1117/12.702445 ]
Dong L, Zhou J T, Sun W W, Yan D Q and Wang R D. 2020. First steps toward concealing the traces left by reversible image data hiding. IEEE Transactions on Circuits and Systems Ⅱ: Express Briefs, 67(5): 951-955 [DOI: 10.1109/TCSII.2020.2981550]
Dragoi I C and Coltuc D. 2019. Prediction-error-ordering for high-fidelity reversible data hiding//Proceedings of 2019 IEEE International Conference on Acoustics, Speech and Signal Processing. Brighton, UK: IEEE: 2652-2656 [ DOI: 10.1109/ICASSP.2019.8683381 http://dx.doi.org/10.1109/ICASSP.2019.8683381 ]
Dragoi I C and Coltuc D. 2021. On the security of reversible data hiding in encrypted images by MSB prediction. IEEE Transactions on Information Forensics and Security, 16: 187-189 [DOI: 10.1109/TIFS.2020.3006382]
Fridrich J, Goljan M and Du R. 2002. Lossless data embedding for all image formats//Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents Ⅳ. San Jose, USA: SPIE: 572-583 [ DOI: 10.1117/12.465317 http://dx.doi.org/10.1117/12.465317 ]
Gao E D, Pan Z B and Gao X Y. 2019. Reversible data hiding based on novel pairwise PVO and annular merging strategy. Information Sciences, 505: 549-561 [DOI: 10.1016/j.ins.2019.07.101]
He J H, Chen J X and Tang S H. 2020a. Reversible data hiding in JPEG images based on negative influence models. IEEE Transactions on Information Forensics and Security, 15: 2121-2133 [DOI: 10.1109/TIFS.2019.2958758]
He W G and Cai Z C. 2020. An insight into pixel value ordering prediction-based Prediction-error expansion. IEEE Transactions on Information Forensics and Security, 15: 3859-3871 [DOI: 10.1109/TIFS.2020.3002377]
He W G and Cai Z C. 2021. Reversible data hiding based on dual pairwise prediction-error expansion. IEEE Transactions on Image Processing, 30: 5045-5055 [DOI: 10.1109/TIP.2021.3078088]
He W G, Cai Z C and Wang Y M. 2020b. Flexible spatial location-based PVO predictor for high-fidelity reversible data hiding. Information Sciences, 520: 431-444 [DOI: 10.1016/j.ins.2020.02.003]
He W G, Cai Z C and Wang Y M. 2021a. High-fidelity reversible image watermarking based on effective prediction error-pairs modification. IEEE Transactions on Multimedia, 23: 52-63 [DOI: 10.1109/TMM.2020.2982042]
He W G, Xiong G Q and Wang Y M. 2021b. Reversible data hiding based on adaptive multiple histograms modification. IEEE Transactions on Information Forensicsand Security, 16: 3000-3012 [DOI: 10.1109/TIFS.2021.3069173]
He W G, Zhou K, Cai J, Wang L and Xiong G Q. 2017. Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. Journal of Visual Communication and Image Representation, 49: 351-360 [DOI: 10.1016/j.jvcir.2017.10.001]
Hong W, Chen T S and Chen J. 2015. Reversible data hiding using Delaunay triangulation and selective embedment. Information Sciences, 308: 140-154 [DOI: 10.1016/j.ins.2014.03.030]
Hong W, Chen T S and Wu H Y. 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters, 19(4): 199-202 [DOI: 10.1109/LSP.2012.2187334]
Hou D D, Qin C, Yu N H and Zhang W M. 2018a. Reversible visual transformation via exploring the correlations within color images. Journal of Visual Communication and Image Representation, 53: 134-145 [DOI: 10.1016/j.jvcir.2017.11.014]
Hou D D, Zhang W M, Liu J Y, Zhou S Y, Chen D D and Yu N H. 2019. Emerging applications of reversible data hiding//Proceedings of the 2nd International Conference on Image and Graphics Processing. New York, USA: ACM: 105-109 [ DOI: 10.1145/3313950.3313952 http://dx.doi.org/10.1145/3313950.3313952 ]
Hou D D, Zhang W M, Yang Y and Yu N H. 2018b. Reversibledata hiding under inconsistent distortion metrics. IEEE Transactions on Image Processing, 27(10): 5087-5099 [DOI: 10.1109/TIP.2018.2851074]
Hou D D, Zhang W M and Yu N H. 2016a. Image camouflage by reversible image transformation. Journal of Visual Communication and Image Representation, 40: 225-236 [DOI: 10.1016/j.jvcir.2016.06.018]
Hou D D, Zhang W M, Zhan Z H, Jiang R Q, Yang Y and Yu N H. 2016b. Reversible image processing via reversible data hiding//Proceedings of 2016 IEEE International Conference on Digital Signal Processing. Beijing, China: IEEE: 427-431 [ DOI: 10.1109/ICDSP.2016.7868593 http://dx.doi.org/10.1109/ICDSP.2016.7868593 ]
Hou J C, Ou B, Tian H W and Qin Z. 2021. Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Processing: Image Communication, 92: #116118 [DOI: 10.1016/j.image.2020.116118]
Hu R W and Xiang S J. 2021a. CNN prediction based reversible data hiding. IEEE Signal Processing Letters, 28: 464-468 [DOI: 10.1109/LSP.2021.3059202]
Hu R W and Xiang S J. 2021b. Lossless robust image watermarking by using polar harmonic transform. Signal Processing, 179: #107833 [DOI: 10.1016/j.sigpro.2020.107833]
Hu R W and Xiang S J. 2021c. Cover-lossless robust image watermarking against geometric deformations. IEEE Transactions on Image Processing, 30: 318-331 [DOI: 10.1109/TIP.2020.3036727]
Hu Y J, Lee H K and Li J W. 2009. DE-based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology, 19(2): 250-260 [DOI: 10.1109/TCSVT.2008.2009252]
Huang F J, Huang J W and Shi Y Q. 2016. New framework for reversible data hiding in encrypted domain. IEEE Transactions on Information Forensics and Security, 11(12): 2777-2789 [DOI: 10.1109/TIFS.2016.2598528]
Huang Y X, Cao X, Wu H T and Cheung Y M. 2021. Reversible data hiding in Jpeg images for privacy protection//Proceedings of 2021 IEEE International Conference on Acoustics, Speech and Signal Processing. Toronto, Canada: IEEE: 2715-2719 [ DOI: 10.1109/ICASSP39728.2021.9415118 http://dx.doi.org/10.1109/ICASSP39728.2021.9415118 ]
Jia Y J, Yin Z X, Zhang X P and Luo Y L. 2019. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Processing, 163: 238-246 [DOI: 10.1016/j.sigpro.2019.05.020]
Jiang R Q, Zhou H, Zhang W M and Yu N H. 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Transactions on Multimedia, 20(1): 55-67 [DOI: 10.1109/TMM.2017.2723244]
Jolfaei A, Wu X W and Muthukkumarasamy V. 2016. On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security, 11(2): 235-246 [DOI: 10.1109/TIFS.2015.2489178]
Kalker T and Willems F M J. 2002. Capacity bounds and constructions for reversible data-hiding//Proceedings of the 14th International Conference on Digital Signal Processing Proceedings. Santorini, Greece: IEEE: 71-76 [ DOI: 10.1109/ICDSP.2002.1027818 http://dx.doi.org/10.1109/ICDSP.2002.1027818 ]
Kamstra L and Heijmans H J A M. 2005. Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing, 14(12): 2082-2090 [DOI: 10.1109/TIP.2005.859373]
Kaur G, Singh S, Rani R and Kumar R. 2021. A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO). Archives of Computational Methods in Engineering, 28(5): 3517-3568 [DOI: 10.1007/s11831-020-09512-3]
Ke Y, Zhang M Q, Liu J, Su T T and Yang X Y. 2018. A multilevel reversible data hiding scheme in encrypted domain based on LWE. Journal of Visual Communication and Image Representation, 54: 133-144 [DOI: 10.1016/j.jvcir.2018.05.002]
Ke Y, Zhang M Q, Liu J, Su T T and Yang X Y. 2020. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2353-2365 [DOI: 10.1109/TCSVT.2019.2963393]
Ke Y, Zhang M Q, Zhanga X P, Liu J, Su T T and Yang X Y. 2021. A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese Remainder Theorem [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https://doi.org/10.1109/TCSVT.2021.3081575 https://doi.org/10.1109/TCSVT.2021.3081575
Khelifi F. 2018. On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Processing, 143: 336-345 [DOI: 10.1016/j.sigpro.2017.09.020]
Kim S, Qu X C, Sachnev V and Kim H J. 2019. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Transactions on Circuits and Systems for Video Technology, 29(11): 3236-3246 [DOI: 10.1109/TCSVT.2018.2878932]
Kumar Rand Jung K H. 2020. Robust reversible data hiding scheme based on two-layer embedding strategy. Information Sciences, 512: 96-107 [DOI: 10.1016/j.ins.2019.09.062]
Li M, Ren H, Xiang Y and Zhang Y S. 2021. Reversible data hiding in encrypted color images using cross-channel correlations. Journal of Visual Communication and Image Representation, 78: #103166 [DOI: 10.1016/j.jvcir.2021.103166]
Li M, Xiao D, Peng Z X and Nan H. 2014. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction. ETRI Journal, 36(2): 325-328 [DOI: 10.4218/etrij.14.0213.0449]
Li X L, Li J, Li B and Yang B. 2013a. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Processing, 93(1): 198-205 [DOI: 10.1016/j.sigpro.2012.07.025]
Li X L, Yang B and Zeng T Y. 2011. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Transactions on Image Processing, 20(12): 3524-3533 [DOI: 10.1109/TIP.2011.2150233]
Li X L, Zhang W M, Gui X L and Yang B. 2013b. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Transactions on Information Forensics and Security, 8(7): 1091-1100 [DOI: 10.1109/TIFS.2013.2261062]
Li X L, Zhang W M, Gui X L and Yang B. 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security, 10(9): 2016-2027 [DOI: 10.1109/TIFS.2015.2444354]
Liang X Y and Xiang S J. 2020. Robust reversible audio watermarking based on high-order difference statistics. Signal Processing, 173: #107584 [DOI: 10.1016/j.sigpro.2020.107584]
Liang X Y and Xiang S J. 2020. Robust and reversible data hiding algorithm based on histogram of difference statistics shifting in wavelet domain. Journal of Cyber Security, 5(3): 113-127
梁幸源, 项世军. 2020. 小波域基于差分统计量直方图平移的图像鲁棒可逆信息隐藏算法. 信息安全学报, 5(3): 113-127 [DOI: 10.19363/J.cnki.cn10-1380/tn.2020.05.09]
Liao X and Shu C W. 2015. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. Journal of Visual Communication and Image Representation, 28: 21-27 [DOI: 10.1016/j.jvcir.2014.12.007]
Lin S J and Chung W H. 2012. The scalar scheme for reversible information-embedding in gray-scale signals: capacity evaluation and code constructions. IEEE Transactions on Information Forensics and Security, 7(4): 1155-1167 [DOI: 10.1109/TIFS.2012.2197614]
Liu J Y, Hou D D, Zhang W M and Yu N H. 2018. Reversible adversarial examples [EB/OL]. [2021-04-19] . https://arxiv.org/pdf/1811.00189v2.pdf https://arxiv.org/pdf/1811.00189v2.pdf
Liu Z L and Pun C M. 2018. Reversible data-hiding in encrypted images by redundant space transfer. Information Sciences, 433-434: 188-203 [DOI: 10.1016/j.ins.2017.12.044]
Long M, Peng F and Li H Y. 2018. Separable reversible data hiding and encryption for HEVC video. Journal of Real-Time Image Processing, 14(1): 171-182 [DOI: 10.1007/s11554-017-0727-y]
Ma K D, Zhang W M, Zhao X F, Yu N H and Li F H. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security, 8(3): 553-562 [DOI: 10.1109/TIFS.2013.2248725]
Ma W J, Wu Y Q and Yin Z X. 2021. High-capacity reversible data hiding in encrypted images using adaptive encoding [EB/OL]. [2021-04-19] . https://arxiv.org/pdf/2102.12620.pdf https://arxiv.org/pdf/2102.12620.pdf
Mohammadi A, Nakhkash M and Akhaee M A. 2020. A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2366-2376 [DOI: 10.1109/TCSVT.2020.2990952]
Ni Z C, Shi Y Q, Ansari N and Su W. 2003. Reversible data hiding//Proceedings of 2003 International Symposium on Circuits and Systems. Bangkok, Thailand: IEEE: 912-915 [ DOI: 10.1109/ISCAS.2003.1206123 http://dx.doi.org/10.1109/ISCAS.2003.1206123 ]
Ni Z C, Shi Y Q, Ansari N and Su W. 2006. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3): 354-362 [DOI: 10.1109/TCSVT.2006.869964]
Ou B, Li X L and Wang J W. 2016. High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. Journal of Visual Communication and Image Representation, 39: 12-23 [DOI: 10.1016/j.jvcir.2016.05.005]
Ou B, Li X L, Zhang W M and Zhao Y. 2019. Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Transactions on Circuits and Systems for Video Technology, 29(7): 2176-2190 [DOI: 10.1109/TCSVT.2018.2859792]
Ou B, Li X L, Zhao Y and Ni R R. 2014. Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Processing: Image Communication, 29(7): 760-772 [DOI: 10.1016/j.image.2014.05.003]
Ou B, Li X L, Zhao Y, Ni R R and Shi Y Q. 2013. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Transactions on Image Processing, 22(12): 5010-5021 [DOI: 10.1109/TIP.2013.2281422]
Ou B and Zhao Y. 2020. High capacity reversible data hiding based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2329-2342 [DOI: 10.1109/TCSVT.2019.2921812]
Pan Z B, Gao X Y, Gao E D and Fan G J. 2020. Adaptive complexity for pixel-value-ordering based reversible data hiding. IEEE Signal Processing Letters, 27: 915-919 [DOI: 10.1109/LSP.2020.2996507]
Peng F, Jiang W Y, Qi Y, Lin Z X and Long M. 2020. Separable robust reversible watermarking in encrypted 2D vector graphics. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2391-2405 [DOI: 10.1109/TCSVT.2020.2986782]
Peng F, Li X L and Yang B. 2014. Improved PVO-based reversible data hiding. Digital Signal Processing, 25: 255-265 [DOI: 10.1016/j.dsp.2013.11.002]
Peng F, Lin Z X, Zhang X and Long M. 2019. Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers. IEEE Transactions on Information Forensics and Security, 14(9): 2400-2411 [DOI: 10.1109/TIFS.2019.2899520]
Peng F, Lin X Z, Zhang X and Long M. 2021a. A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting. IEEE Transactions on Circuits and Systems for Video Technology, 31(1): 411-424 [DOI: 10.1109/TCSVT.2020.2969464]
Peng F, Long B and Long M. 2021b. A general region nesting based semi-fragile reversible watermarking for authenticating 3D mesh models. IEEE Transactions on Circuits and Systems for Video Technology, 31(11): 4538-4553 [DOI: 10.1109/TCSVT.2021.3052468]
Peng F, Yan Z J and Long M. 2018. Print-scan resilient watermarking for binary engineering graphics based on quantization modulation and pixel block addition. Journal of Cyber Security, 3(6): 67-77
彭飞, 颜臻杰, 龙敏. 2018. 基于量化调制与像素块添加的二值工程图抗打印扫描水印算法. 信息安全学报, 3(6): 67-77 [DOI: 10.19363/J.cnki.cn10-1380/tn.2018.11.06]
Peng W, Hu N and Hu J J. 2020. Overview of research on image steganalysis algorithms. Computer Science, 47(S1): 325-331
彭伟, 胡宁, 胡璟璟. 2020. 图像隐写分析算法研究概述. 计算机科学, 47(S1): 325-331 [DOI: 10.11896/jsjkx.190600103]
Puech W, Chaumont M and Strauss O. 2008. A reversible data hiding method for encrypted images//Proceedings of SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents Ⅹ. San Jose, USA: SPIE: #68191E [ DOI: 10.1117/12.766754 http://dx.doi.org/10.1117/12.766754 ]
Puteaux P and Puech W. 2018a. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security, 13(7): 1670-1681 [DOI: 10.1109/TIFS.2018.2799381]
Puteaux P and Puech W. 2018b. EPE-based huge-capacity reversible data hiding in encrypted images//Proceedings of 2018 IEEE International Workshop on Information Forensics and Security. Hong Kong, China: IEEE: 1-7 [ DOI: 10.1109/WIFS.2018.8630788 http://dx.doi.org/10.1109/WIFS.2018.8630788 ]
Puteaux P and Puech W. 2021a. A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Transactions on Multimedia, 23: 636-650 [DOI: 10.1109/TMM.2020.2985537]
Puteaux P and Puech W. 2021b. Rebuttal: on the security of reversible data hiding in encrypted images by MSB prediction. IEEE Transactions on Information Forensics and Security, 16: 2445-2446 [DOI: 10.1109/TIFS.2021.3055630]
Puyang Y, Yin Z X and Qian Z X. 2018. Reversible data hiding in encrypted images with Two-MSB prediction//Proceedings of 2018 IEEE International Workshop on Information Forensics and Security. Hong Kong, China: IEEE: 1-7 [ DOI: 10.1109/WIFS.2018.8630785 http://dx.doi.org/10.1109/WIFS.2018.8630785 ]
Qi W F, Li X L, Zhang T and Guo Z M. 2020. Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2300-2312 [DOI: 10.1109/TCSVT.2019.2942489]
Qian Z X, Han X Y and Zhang X P. 2013. Separable reversible data hiding in encrypted images by n-nary histogram modification//Proceedings of the 3rd International Conference on Multimedia Technology. [s. l.]: Atlantis Press: 862-869 [ DOI: 10.2991/icmt-13.2013.107 http://dx.doi.org/10.2991/icmt-13.2013.107 ]
Qian Z X, Xu H S, Luo X Y and Zhang X P. 2019. New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Circuits and Systems for Video Technology, 29(2): 351-362 [DOI: 10.1109/TCSVT.2018.2797897]
Qian Z X and Zhang X P. 2016. Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26(4): 636-646 [DOI: 10.1109/TCSVT.2015.2418611]
Qiao T, Wang S, Luo X Y and Zhu Z Q. 2021. Robust steganography resisting JPEG compression by improving selection of cover element. Signal Processing, 183: #108048 [DOI: 10.1016/j.sigpro.2021.108048]
Qin C, Qian X K, Hong W and Zhang X P. 2019. An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Information Sciences, 487: 176-192 [DOI: 10.1016/j.ins.2019.03.008]
Qin J Q and Huang F J. 2019. Reversible data hiding based on multiple two-dimensional histograms modification. IEEE Signal Processing Letters, 26(6): 843-847 [DOI: 10.1109/LSP.2019.2909080]
Qiu Y Q, Chen X, Ying Q C, Zeng H Q, Qian Z X and Zhang X P. 2021. High-capacity reversible data hiding in encrypted image using pixel predictions and Huffman encoding [EB/OL]. [2021-04-19] . https://arxiv.org/pdf/2102.12613v1.pdf https://arxiv.org/pdf/2102.12613v1.pdf
Qu L F, Chen F, Zhang S J and He H J. 2021b. Cryptanalysis of reversible data hiding in encrypted images by block permutation and comodulation [J/OL]. IEEE Transactions on Multimedia, https: doi.org/10.1109/TMM.2021.3090588 http://doi.org/10.1109/TMM.2021.3090588
Qu L F, He H J and Chen F. 2021a. On the security of block permutation and co-XOR in reversible data hiding [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https:doi.org/10.1109/TCSVT.2021.3069811 http://doi.org/10.1109/TCSVT.2021.3069811
Qu L F, He H J, Chen F and Zhang S J. 2021. Security analysis of image encryption algorithm based on block modulation-scrambling. Journal of Computer Research and Development, 58(4): 849-861
屈凌峰, 和红杰, 陈帆, 张善俊. 2021. 基于块调制—置乱的图像加密算法安全性分析. 计算机研究与发展, 58(4): 849-861 [DOI: 10.7544/issn1000-1239.2021.20200011]
Qu X C and Kim H J. 2015. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Processing, 111: 249-260 [DOI: 10.1016/j.sigpro.2015.01.002]
Sachnev V, Kim H J, Nam J, Suresh S and Shi Y Q. 2009. Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology, 19(7): 989-999 [DOI: 10.1109/TCSVT.2009.2020257]
Shamir A. 1979. How to share a secret. Communications of the ACM, 22(11): 612-613 [DOI: 10.1145/359168.359176]
Sheidani S, Mahmoudi-Aznaveh A and Eslami Z. 2021. CPA-Secure privacy-preserving reversible data hiding for JPEG images. IEEE Transactions on Information Forensics and Security, 16: 3647-3661 [DOI: 10.1109/TIFS.2021.3080497]
Shi Y Q, Ni Z C, Zou D K, Liang C Y and Xuan G R. 2004. Lossless data hiding: fundamentals, algorithms and applications//Proceedings of 2004 IEEE international symposium on circuits and systems. Vancouver, Canada: IEEE: 33-36 [ DOI: 10.1109/ISCAS.2004.1329201 http://dx.doi.org/10.1109/ISCAS.2004.1329201 ]
Shiu C W, Chen Y C and Hong W. 2015. Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Processing: Image Communication, 39: 226-233 [DOI: 10.1016/j.image.2015.09.014]
Sweldens W. 1998. The lifting scheme: a construction of second generation wavelets. SIAM Journal on Mathematical Analysis, 29(2): 511-546 [DOI: 10.1137/S0036141095289051]
Tang Z J, Xu S J, Yao H, Qin C and Zhang X Q. 2019. Reversible data hiding with differential compression in encrypted image. Multimedia Tools and Applications, 78(8): 9691-9715 [DOI: 10.1007/s11042-018-6567-3]
Thodi D M and Rodriguez J J. 2004. Prediction-error based reversible watermarking//Proceedings of 2004 International Conference on Image Processing. Singapore, Singapore: IEEE: 1549-1552 [ DOI: 10.1109/ICIP.2004.1421361 http://dx.doi.org/10.1109/ICIP.2004.1421361 ]
Thodi D M and Rodriguez J J. 2007. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing, 16(3): 721-730 [DOI: 10.1109/TIP.2006.891046]
Tian J. 2002. Wavelet-based reversible watermarking for authentication//Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents Ⅳ. San Jose, USA: SPIE: 679-690 [ DOI: 10.1117/12.465329 http://dx.doi.org/10.1117/12.465329 ]
Tian J. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8): 890-896 [DOI: 10.1109/TCSVT.2003.815962]
Tsai Y Y. 2021. Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding. IEEE Transactions on Multimedia, 23: 2286-2296 [DOI: 10.1109/TMM.2020.3009492]
Wang J X, Chen X, Ni J Q, Mao N X and Shi Y Q. 2020a. Multiple histograms-based reversible data hiding: framework and realization. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2312-2328 [DOI: 10.1109/TCSVT.2019.2915584]
Wang J X, Mao N X, Chen X, Ni J Q, Wang C T and Shi Y Q. 2019. Multiple histograms based reversible data hiding by using FCM clustering. Signal Processing, 159: 193-203 [DOI: 10.1016/j.sigpro.2019.02.013]
Wang X, Li X L and Pei Q Q. 2020b. Independent embedding domain based two-stage robust reversible watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2406-2417 [DOI: 10.1109/TCSVT.2019.2915116]
Wang X Y,Wang X Y, Ma B, Li Q and Shi Y Q. 2021a. High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Processing Letters, 28: 1125-1129 [DOI: 10.1109/LSP.2021.3080181]
Wang Y M, Cai Z C and He W G. 2021b. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Transactions on Multimedia, 23: 1466-1473 [DOI: 10.1109/TMM.2020.2999187]
Wang Y M and He W G. 2021. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction [J/OL]. IEEE Transactions on Multimedia, https://doi.org/10.1109/TMM.2021.3062699 https://doi.org/10.1109/TMM.2021.3062699
Weinberger M J, Seroussi G and Sapiro G. 2000. The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Transactions on Image Processing, 9(8): 1309-1324 [DOI: 10.1109/83.855427]
Weng S W, Shi Y Q, Hong W and Yao Y. 2019. Dynamic improved pixel value ordering reversible data hiding. Information Sciences, 489: 136-154 [DOI: 10.1016/j.ins.2019.03.032]
Weng S W, Tan W L, Ou B and Pan J S. 2021a. Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Information Sciences, 549: 13-33 [DOI: 10.1016/j.ins.2020.10.063]
Weng S W, Zhang C Y, Zhang T C and Chen K M. 2021b. High capacity reversible data hiding in encrypted images using SIBRW and GCC. Journal of Visual Communication and Image Representation, 75: #102932 [DOI: 10.1016/j.jvcir.2020.102932]
Weng S W, Zhang G H, Pan J S and Zhou Z L. 2017. Optimal PPVO-based reversible data hiding. Journal of Visual Communication and Image Representation, 48: 317-328 [DOI: 10.1016/j.jvcir.2017.05.005]
Wu G H, Gong L C, Yuan L F and Yao Y. 2019. Review of information hiding on Chinese text. Journal on Communications, 40(9): 145-156
吴国华, 龚礼春, 袁理锋, 姚晔. 2019. 中文文本信息隐藏研究进展. 通信学报, 40(9): 145-156 [DOI: 10.11959/j.issn.1000-436x.2019208]
Wu H R, Li X L, Zhao Y and Ni R R. 2020c. Improved PPVO-based high-fidelity reversible data hiding. Signal Processing, 167: #107264 [DOI: 10.1016/j.sigpro.2019.107264]
Wu X S, Qiao T, Xu M and Zheng N. 2021. Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Processing, 188: #108200 [DOI: 10.1016/j.sigpro.2021.108200]
Wu X T, Weng J and Yan W Q. 2018. Adopting secret sharing for reversible data hiding in encrypted images. Signal Processing, 143: 269-281 [DOI: 10.1016/j.sigpro.2017.09.017]
Wu Y Q, Ma W J, Peng Y Y, Zhang R L and Yin Z X. 2020a. Reversible data hiding in encrypted images based on bit-plane compression of prediction error [EB/OL]. [2021-04-19] . https://arxiv.org/pdf/2007.04057.pdf https://arxiv.org/pdf/2007.04057.pdf
Wu Y Q, Xiang Y Z, Guo Y T, Tang J and Yin Z X. 2020b. An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia, 22(8): 1929-1938 [DOI: 10.1109/TMM.2019.2952979]
Xiang S J and Yang L. 2018. Robust and reversible image watermarking algorithm in homomorphic encrypted domain. Journal of Software, 29(4): 957-972
项世军, 杨乐. 2018. 基于同态加密系统的图像鲁棒可逆水印算法. 软件学报, 29(4): 957-972 [DOI: 10.13328/j.cnki.jos.005406]
Xiang Y P, Xiao D, Zhang R, Liang J and Liu R. 2021. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer. Information Sciences, 545: 188-206 [DOI: 10.1016/j.ins.2020.08.019]
Xiao M Y, Li X L, Wang Y Y, Zhao Y and Ni R R. 2019. Reversible data hiding based on pairwise embedding and optimal expansion path. Signal Processing, 158: 210-218 [DOI: 10.1016/j.sigpro.2019.01.008]
Xiong L Z, Han X, Yang C N and Shi Y Q. 2021. Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https://doi.org/10.1109/TCSVT.2021.3055072 https://doi.org/10.1109/TCSVT.2021.3055072
Yang Y, Huang G Y and Zou T R. 2021. Color image reversible data hiding algorithm based on adaptive partitioning. Journal of Anhui University (Natural Sciences), 45(3): 15-25
杨杨, 黄艮燕, 邹天锐. 2021. 基于自适应分块的彩色图像可逆信息隐藏算法. 安徽大学学报(自然科学版), 45(3): 15-25 [DOI: 10.3969/j.issn.1000-2162.2021.03.004]
Yang Y, Zou T R, Huang G Y and Zhang W M. 2021. A high visual quality color image reversible data hiding scheme based on B-R-G embedding principle and CIEDE2000 assessment metric [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https://doi.org/10.1109/TCSVT.2021.3084676 https://doi.org/10.1109/TCSVT.2021.3084676
Yao H, Mao F Y, Qin C and TangZ J. 2021. Dual-JPEG-image reversible data hiding. Information Sciences, 563: 130-149 [DOI: 10.1016/j.ins.2021.02.015]
Yao Y Z, Zhang W M and Yu N H. 2016. Inter-frame distortion drift analysis for reversible data hiding in encrypted H. 264/AVC video bitstreams. Signal Processing, 128: 531-545 [DOI: 10.1016/j.sigpro.2016.05.004]
Yi S, Zhou J, Hua Z Y and Xiang Y. 2021. Reversible data hiding method in encrypted images using secret sharing and Huffman coding//Proceedings of the 11th International Conference on Information Science and Technology. Chengdu, China: IEEE: 94-105 [ DOI: 10.1109/ICIST52614.2021.9440649 http://dx.doi.org/10.1109/ICIST52614.2021.9440649 ]
Yi S and Zhou Y C. 2019. Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia, 21(1): 51-64 [DOI: 10.1109/TMM.2018.2844679]
Yin Z X, Abel A, Tang J, Zhang X P and Luo B. 2017. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools and Applications, 76(3): 3899-3920 [DOI: 10.1007/s11042-016-4049-z]
Yin Z X, Luo B and Hong W. 2014. Separable and error-free reversible data hiding in encrypted image with high payload. The Scientific World Journal, 2014: #604876 [DOI: 10.1155/2014/604876]
Yin Z X, Peng Y Y and Xiang Y Z. 2020a. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression [J/OL]. IEEE Transactions on Dependable and Secure Computing, https://doi.org/10.1109/TDSC.2020.3019490 https://doi.org/10.1109/TDSC.2020.3019490
Yin Z X, She X M, Tang J and Luo B. 2021a. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Processing, 187: #108146 [DOI: 10.1016/j.sigpro.2021.108146]
Yin Z X, Wang H, Chen L, Wang J and Zhang W M. 2021b. Reversible adversarial example based on reversible image transformation[EB/OL]. [2021-04-19] . https://arxiv.org/pdf/1911.02360v5.pdf https://arxiv.org/pdf/1911.02360v5.pdf
Yin Z X, Wang H B, Zhao H F, Luo B and Zhang X P. 2015. Complete separable reversible data hiding in encrypted image//Proceedings of the 1st International Conference on Cloud Computing and Security. Nanjing, China: Springer: 101-110 [ DOI: 10.1007/978-3-319-27051-7_9 http://dx.doi.org/10.1007/978-3-319-27051-7_9 ]
Yin Z X, Xiang Y Z and Zhang X P. 2020b. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Transactions on Multimedia, 22(4): 874-884 [DOI: 10.1109/TMM.2019.2936314]
Yin Z X, Xu N and Wang F. 2019. Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models[EB/OL]. [2021-04-19] . https://arxiv.org/pdf/1908.02473v2.pdf https://arxiv.org/pdf/1908.02473v2.pdf
You Z X, Li S, Qian Z X and Zhang X P. 2021. Reversible privacy-preserving recognition//Proceedings of 2021 IEEE International Conference on Multimedia and Expo. Shenzhen, China: IEEE: 1-6 [ DOI: 10.1109/ICME51207.2021.9428115 http://dx.doi.org/10.1109/ICME51207.2021.9428115 ]
Yu C Q, Zhang X Q, Zhang X P, Li G X and Tang Z J. 2021. Reversible data Hiding with hierarchical embedding for encrypted images [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https://doi.org/10.1109/TCSVT.2021.3062947 https://doi.org/10.1109/TCSVT.2021.3062947
Zhang T, Li X L, Qi W F and Guo Z M. 2020. Location-based PVO and adaptive pairwise modification for efficient reversible data hiding. IEEE Transactions on Information Forensics and Security, 15: 2306-2319 [DOI: 10.1109/TIFS.2019.2963766]
Zhang W M, Hu X C, Li X L and Yu N H. 2013. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Transactions on Image Processing, 22(7): 2775-2785 [DOI: 10.1109/TIP.2013.2257814]
Zhang W M, Hu X C, Li X L and Yu N H. 2015. Optimal transition probability of reversible data hiding for general distortion metrics and its applications. IEEE Transactions on Image Processing, 24(1): 294-304 [DOI: 10.1109/TIP.2014.2358881]
Zhang W M, Ma K D and Yu N H. 2014b. Reversibility improved data hiding in encrypted images. Signal Processing, 94: 118-127 [DOI: 10.1016/j.sigpro.2013.06.023]
Zhang W M, Wang H, HOU D D and Yu N H. 2016a. Reversible data hiding in encrypted images by reversible image transformation. IEEE Transactions on Multimedia, 18(8): 1469-1479 [DOI: 10.1109/TMM.2016.2569497]
Zhang X P. 2011. Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4): 255-258 [DOI: 10.1109/LSP.2011.2114651]
Zhang X P. 2012. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security, 7(2): 826-832 [DOI: 10.1109/TIFS.2011.2176120]
Zhang X P. 2016. Behavior steganography in social network//Proceeding of the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kaohsiung, China: Springer: 21-23 [ DOI: 10.1007/978-3-319-50209-0_3 http://dx.doi.org/10.1007/978-3-319-50209-0_3 ]
Zhang X P, Long J, Wang Z C and Cheng H. 2016b. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9): 1622-1631 [DOI: 10.1109/TCSVT.2015.2433194]
Zhang X P, Qian Z X, Feng G R and Ren Y L. 2014a. Efficient reversible data hiding in encrypted images. Journal of Visual Communication and Image Representation, 25(2): 322-328 [DOI: 10.1016/j.jvcir.2013.11.001]
Zhang X P, Qian Z X and Li S. 2016c. Prospect of digital steganography research. Journal of Applied Sciences, 34(5): 475-489
张新鹏, 钱振兴, 李晟. 2016c. 信息隐藏研究展望. 应用科学学报, 34(5): 475-489 [DOI: 10.3969/j.issn.0255-8297.2016.05.001]
Zhang X P and Yin Z X. 2017. Data hiding in multimedia. Chinese Journal of Nature, 39(2): 87-95
张新鹏, 殷赵霞. 2017. 多媒体信息隐藏技术. 自然杂志, 39(2): 87-95 [DOI: 10.3969/j.issn.0253-9608.2017.02.002]
Zhang Y S, Zhao R Y, Xiao X L, Lan R S, Liu Z and Zhang X P. 2021. HF-TPE: high-fidelity thumbnail-preserving encryption [J/OL]. IEEE Transactions on Circuits and Systems for Video Technology, https://doi.org/10.1109/TCSVT.2021.3070348 https://doi.org/10.1109/TCSVT.2021.3070348
Zhang Z and Zhang W M. 2015. Reversible steganography: data hiding for covert storage//Proceedings of 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. Hong Kong, China: IEEE: 753-756 [ DOI: 10.1109/APSIPA.2015.7415372 http://dx.doi.org/10.1109/APSIPA.2015.7415372 ]
Zheng S L, Li D D, Hu D H, Ye D P, Wang L N and Wang J W. 2016. Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools and Applications, 75(21): 13765-13778 [DOI: 10.1007/s11042-015-2920-y]
Zhou J T, Sun W W, Dong L, Liu X M, Au O C and Tang Y Y. 2016. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology, 26(3): 441-452 [DOI: 10.1109/TCSVT.2015.2416591]
Zhou L N, Shan W J, Tang X, Hu B W and Liu X M. 2020. Reversible data hiding algorithm with high imperceptibility based on histogram shifting//Proceedings of 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). Rhodes, Greece: IEEE: 628-633 [ DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00110 http://dx.doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00110 ]
Zhu Z Q, Zheng N, Qiao T and Xu M. 2019. Robust steganography by modifying sign of DCT coefficients. IEEE Access, 7: 168613-168628 [DOI: 10.1109/ACCESS.2019.2953504]
相关作者
相关机构
京公网安备11010802024621