[1]朱悦, 庄媛媛. 联邦学习的个人信息保护合规分析框架[J]. 信息安全研究, 2023, 9(2): 162170[2]Zhang Xinpeng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255258[3]Ke Yan, Zhang Minqing, Liu Jia, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Trans on Circuits and Systems for Video Technology, 2020, 30(8): 23532365[4]Wu Xiaotian, Weng Jian, Yan Weiqi. Adopting secret sharing for reversible data hiding in encrypted images[J]. Signal Processing, 2018, 143: 269281[5]耿涛. 安全多方计算若干问题以及应用研究[D]. 北京: 北京邮电大学, 2012[6]Shannon CE. A mathematical theory of communication[J]. Bell Syst Tech J, 1948, 27: 379423[7]Preishuber M, Hütter T, Katzenbeisser S, et al. Depreciating motivation and empirical security analysis of chaos-based image and video encryption[J]. IEEE Trans Information Forensics Security, 2018, 13(1): 21372150[8]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613[9]Thien CC, Lin JC. Secret image sharing[J]. Computers and Graphics, 2002, 26(5): 765770[10]Chen Yuchi, Hung TH, Hsieh SH, et al. A new reversible data hiding in encrypted image based on multisecret sharing and lightweight cryptographic algorithms[J]. IEEE Trans Information Forensics Security, 2019, 14(12): 33323343[11]Chen Bing, Lu Wei, Huang Jiwu, et al. Secret sharing based reversible data hiding in encrypted images with multiple data hiders[J]. IEEE Trans on Dependable and Secure Computing, 2022, 19(2): 978991[12]Qin Chuan, Jiang Chanyu, Qun Mo, et al. Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28)[J]. IEEE Trans on Circuits and Systems for Video Technology, 2022, 32(4): 19281941[13]Hua Zhongyun, Wang Yanxiang, Yi Shuang, et al. Reversible data hiding in encrypted images using cipherfeedback secret sharing[J]. IEEE Trans on Circuits and Systems for Video Technology, 2022, 32(8): 49684982[14]王泽曦, 张敏情, 柯彦, 等. 基于图像秘密共享的密文域可逆信息隐藏算法[J]. 计算机应用, 2022, 42(5): 14801489[15]张敏情, 王泽曦, 柯彦, 等. 基于多项式秘密共享的图像密文域可逆信息隐藏[J]. 电子与信息学报, 2022, 44(12): 43374347[16]Jin Xin, Su Lanxin, Huang Jitao. A reversible data hiding algorithm based on secret sharing[J]. Journal of Information Hiding and Privacy Protection, 2021, 3(2): 69[17]Xiong Lizhi, Han Xiao, Yang Chingnung, et al. RDHDES: Reversible data hiding over distributed encryptedimage servers based on secret sharing[J]. ACM Trans on Multimedia Computing, Communications and Applications, 2023, 19(1): 119
|