Journal of Guangxi Normal University(Natural Science Edition) ›› 2024, Vol. 42 ›› Issue (2): 1-15.doi: 10.16088/j.issn.1001-6600.2023062701
TU Guangsheng1, KONG Yongjun1*, SONG Zhechao2, YE Kang3
[1] MAO Y Y, YOU C S, ZHANG J, et al. A survey on mobile edge computing: the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017, 19(4): 2322-2358. DOI: 10.1109/COMST.2017.2745201. [2] YAN K, LUO G C, ZHENG X, et al. A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-sensing[J]. IEEE Access, 2019, 7: 77541-77554. DOI: 10.1109/ACCESS.2019.2921274. [3] WU D P, SI S S, WU S E, et al. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J]. IEEE Internet of Things Journal, 2018, 5(4): 2958-2970. DOI: 10.1109/JIOT.2017.2768073. [4] ZHOU J, CAO Z F, DONG X L, et al. Security and privacy for cloud-based IoT: challenges[J]. IEEE Communications Magazine, 2017, 55(1): 26-33. DOI: 10.1109/MCOM.2017.1600363CM. [5] GE X R, YU J, ZHANG H L, et al. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 490-504. DOI: 10.1109/TDSC.2019.2896258. [6] LIANG X Q, YAN Z, CHEN X F, et al. Game theoretical analysis on encrypted cloud data deduplication[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5778-5789. DOI: 10.1109/TII.2019.2920402. [7] SUN J F, XIONG H, ZHANG H, et al. Mobile access and flexible search over encrypted cloud data in heterogeneous systems[J]. Information Sciences, 2020, 507: 1-15. DOI: 10.1016/j.ins.2019.08.026. [8] 柯彦, 张敏情, 刘佳, 等. 密文域可逆信息隐藏综述[J]. 计算机应用, 2016, 36(11): 3067-3076, 3092. DOI: 10.11772/j.issn.1001-9081.2016.11.3067. [9] KUMAR S, GUPTA A, WALIA G S. Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges[J]. Applied Intelligence, 2022, 52(7): 7373-7406. DOI: 10.1007/s10489-021-02789-2. [10] 殷赵霞. 面向隐私保护的数字图像隐写方法研究[D]. 合肥: 安徽大学, 2014. [11] 俞春强, 邓方舟, 张显全, 等. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32. DOI: 10.16088/j.issn.1001-6600.2018.02.004. [12] KONG P, FU D, LI X R, et al. Reversible data hiding in encrypted medical DICOM image[J]. Multimedia Systems, 2021, 27(3): 303-315. DOI: 10.1007/s00530-020-00739-5. [13] KITTAWI N, AL-HAJ A. Reversible data hiding using bit flipping and histogram shifting[J]. Multimedia Tools and Applications, 2022, 81(9): 12441-12458. DOI: 10.1007/s11042-022-12364-7. [14] PUTEAUX P, ONG S Y, WONG K S, et al. A survey of reversible data hiding in encrypted images: the first 12 years[J]. Journal of Visual Communication and Image Representation, 2021, 77: 103085. DOI: 10.1016/j.jvcir.2021.103085. [15] LI J, MA R H, GUAN H B. TEES: an efficient search scheme over encrypted data on mobile cloud[J]. IEEE Transactions on Cloud Computing, 2017, 5(1): 126-139. DOI: 10.1109/TCC.2015.2398426. [16] 武晓帅, 徐明, 乔通, 等. 图像空域可逆信息隐藏研究进展[J]. 中国图象图形学报, 2022, 27(1): 125-149. DOI: 10.11834/jig.210292. [17] 李名. 信息熵视角下的密文图像信息隐藏研究[D]. 重庆: 重庆大学, 2014. [18] SUN Y, ZHANG X. A kind of covert channel analysis method based on trusted pipeline[C]// 2011 International Conference on Electrical and Control Engineering. Piscataway, NJ: IEEE, 2011: 5660-5663. DOI: 10.1109/ICECENG.2011.6058071. [19] 王玮, 王位, 石峰, 等. 美国海军数字化转型战略综述[J]. 舰船科学技术, 2021, 43(23): 170-175. DOI: 10.3404/j.issn.1672-7649.2021.12.031. [20] 赵国宏. 作战云体系结构研究[J]. 指挥与控制学报, 2015, 1(3): 292-295. [21] 程学旗, 靳小龙, 王元卓, 等. 大数据系统和分析技术综述[J]. 软件学报, 2014, 25(9): 1889-1908. DOI: 10.13328/j.cnki.jos.004674. [22] YAN Z, WANG M J, LI Y X, et al. Encrypted data management with deduplication in cloud computing[J]. IEEE Cloud Computing, 2016, 3(2): 28-35. DOI: 10.1109/MCC.2016.29. [23] JUNG K H. A survey of reversible data hiding methods in dual images[J]. IETE Technical Review, 2016, 33(4): 441-452. DOI: 10.1080/02564602.2015.1102099. [24] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[C]// Proceedings of SPIE Volume 6819: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Bellingham, WA: SPIE, 2008: 68191E. DOI: 10.1117/12.766754. [25] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. DOI: 10.1109/LSP.2011.2114651. [26] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4): 199-202. DOI: 10.1109/LSP.2012.2187334. [27] ZHOU J T, SUN W W, DONG L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3): 441-452. DOI: 10.1109/TCSVT.2015.2416591. [28] ZHANG X P, QIAN Z X, FENG G R, et al. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328. DOI: 10.1016/j.jvcir.2013.11.001. [29] ZHANG X P, WANG Z C, YU J, et al. Reversible visible watermark embedded in encrypted domain[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 826-830. DOI: 10.1109/ChinaSIP.2015.7230520. [30] ZHENG S L, LI D D, HU D H, et al. Lossless data hiding algorithm for encrypted images with high capacity[J]. Multimedia Tools and Applications, 2016, 75(21): 13765-13778. DOI: 10.1007/s11042-015-2920-y. [31] OU B, LI X L, ZHANG W M. PVO-based reversible data hiding for encrypted images[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 831-835. DOI: 10.1109/ChinaSIP.2015.7230521. [32] HUANG F J, HUANG J W, SHI Y Q. New framework for reversible data hiding in encrypted domain[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2777-2789. DOI: 10.1109/TIFS.2016.2598528. [33] TANG Z J, XU S J, YAO H, et al. Reversible data hiding with differential compression in encrypted image[J]. Multimedia Tools and Applications, 2019, 78(8): 9691-9715. DOI: 10.1007/s11042-018-6567-3. [34] DI F Q, HUANG F J, ZHANG M Q, et al. Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding[J]. Multimedia Tools and Applications. 2018, 77(16): 20917-20935. DOI: 10.1007/s11042-017-5498-8. [35] GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. DOI: 10.1109/TCSVT.2018.2863029. [36] WANG Y M, HE W G. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022, 24: 1288-1298. DOI: 10.1109/TMM.2021.3062699. [37] CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. DOI: 10.1016/j.jvcir.2014.04.003. [38] CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. DOI: 10.1109/TDSC.2020.3011923. [39] XIANG Y P, XIAO D, ZHANG R, et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer[J]. Information Sciences, 2020, 545: 188-206. DOI: 10.1016/j.ins.2020.08.019. [40] MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562. DOI: 10.1109/TIFS.2013.2248725. [41] ZHANG W M, MA K D, YU N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127. DOI: 10.1016/j.sigpro.2013.06.023. [42] MATHEW T, WILSCY M. Reversible data hiding in encrypted images by active block exchange and room reservation[C]// 2014 International Conference on Contemporary Computing and Informatics (IC3I), Piscataway NJ: IEEE, 2014: 839-844. DOI: 10.1109/IC3I.2014.7019628. [43] YI S, ZHOU Y C. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. DOI: 10.1109/TMM.2018.2844679. [44] WU Y Q, XIANG Y Z, GUO Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. DOI: 10.1109/TMM.2019.2952979. [45] YU C Q, ZHANG X Q, ZHANG X P, et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(2): 451-466. DOI: 10.1109/TCSVT.2021.3062947. [46] ZHANG Y, YANG B, NIU X M. Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006, 17(2): 59-65. [47] NGUYEN T S, CHANG C C, CHANG W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing: Image Communication, 2016, 44: 84-91. DOI: 10.1016/j.image.2016.03.010. [48] XIANG S J, LUO X R. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28(11): 3099-3110. DOI: 10.1109/TCSVT.2017.2742023. [49] CAO X C, DU L, WEI X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5): 1132-1143. DOI: 10.1109/TCYB.2015.2423678. [50] QIU Y Q, YING Q C, YANG Y Y, et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(9): 5874-5887. DOI: 10.1109/TCSVT.2022.3163905. [51] PUTEAX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. DOI: 10.1109/TIFS.2018.2799381. [52] PUTEAX P, PUECH W. EPE-based huge-capacity reversible data hiding in encrypted images[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630788. [53] PUYANG Y, YIN Z X, QIAN Z X. Reversible data hiding in encrypted images with two-MSB prediction[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630785. [54] PUTEAUX P, PUECH W. A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021, 23: 636-650. DOI: 10.1109/TMM.2020.2985537. [55] YIN Z X, XIANG Y Z, ZHANG X P. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. DOI: 10.1109/TMM.2019.2936314. [56] 张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354-360. DOI: 10.11999/JEIT150702. [57] 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444. [58] 柯彦, 张敏情, 张英男. 可分离的密文域可逆信息隐藏[J]. 计算机应用研究, 2016, 33(11): 3476-3479. DOI: 10.3969/j.issn.1001-3695.2016.11.061. [59] 柯彦, 张敏情, 项文. 加密域的可分离四进制可逆信息隐藏算法[J]. 科学技术与工程, 2016, 16(27): 58-64. DOI: 10.3969/j.issn.1671-1815.2016.27.010. [60] 柯彦, 张敏情, 刘佳. 可分离的加密域十六进制可逆信息隐藏[J]. 计算机应用, 2016, 36(11): 3082-3087. DOI: 10.11772/j.issn.1001-9081.2016.11.3082. [61] KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain[C]// Digital Forensics and Watermarking: LNCS Volume 10082. Cham: Springer International Publishing AG, 2017: 470-484. DOI: 10.1007/978-3-319-53465-7_35. [62] KE Y, ZHANG M Q, LIU J, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133-144. DOI: 10.1016/j.jvcir.2018.05.002. [63] HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing: Image Communication, 2020, 80: 115632. DOI: 10.1016/j.image.2019.115632. [64] WU H T, CHEUNG Y M, YANG Z Y, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87-96. DOI: 10.1016/j.jvcir.2019.04.015. [65] KE Y, ZHANG M Q, LIU J, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2353-2365. DOI: 10.1109/TCSVT.2019.2963393. [66] SHANNON C E. A mathematical theory of communication[J]. Bell Labs Technical Journal, 1948, 27(4): 379-423. DOI: 10.1002/j.1538-7305.1948.tb01338.x. [67] DRAGOI I C, COLTUC D. On the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 187-189. DOI: 10.1109/TIFS.2020.3006382. [68] PUTEAUX P, PUECH W. Rebuttal: on the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2445-2446. DOI: 10.1109/TIFS.2021.3055630. [69] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150. DOI: 10.13328/j.cnki.jos.004820. [70] 施巍松, 孙辉, 曹杰, 等. 边缘计算: 万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5): 907-924. DOI: 10.7544/issn1000-1239.2017.20160941. [71] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83. DOI: 10.3724/SP.J.1001.2011.03958. [72] 林文敏. 云环境下大数据服务及其关键技术研究[D]. 南京: 南京大学, 2015. |
[1] | XIAO Yuting, LÜ Xiaoqi, GU Yu, LIU Chuanqiang. Classification of Diabetic Retinopathy Based on Split Residual Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(1): 91-101. |
[2] | LIANG Yuting, LUO Yuling, ZHANG Shunsheng. Review on Chaotic Image Encryption Based on Compressed Sensing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(5): 49-58. |
[3] | ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70. |
[4] | YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73. |
|