1Gentry C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 2009 ACM Symposium on Theory of Computing, STOC'09, NY, USA, 2009: 169-178. 被引量:1
2Dijk M V, Gentry C, Halevi S, et al.. Fully homomorphic encryption using ideal lattices[C]. Proceedings of in Advances in Cryptology - EUROCRYPT, Riviera, French, 2010, LNCS 6110: 24-43. 被引量:1
3Cancellaro M, Battisti F, Carli M, et al.. A commutative digital image watermarking and encryption method in the tree structured haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12. 被引量:1
4Kundur D and Karthik K. Video fingerprinting and encryption principles for digital rights management[J]. 1EEE Multimedia, 2004, 92(6): 918-932. 被引量:1
5Memon N and Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4): 643-649. 被引量:1
6Zhang X. Reversible data hiding in encrypted image[J]. IEEESignal Processing Letters, 2011, 18(4): 255-258. 被引量:1
7Sun Y and Zhang Xing. A kind of covert channel analysis method based on trusted pipeline[C]. 2011 International Conference on Electrical and Control Engineering (ICECE), Yichang, China, 2011: 5660-5663. 被引量:1
8Zhang X, Zhang W, and Wang S. Efficient double-layered steganographic embedding[J]. IET Electronics Letters, 2007, 43(8): 482-483. 被引量:1
9Filler T, Judas J, and Pridrich J. Minimizing embedding impact in steganography using trellis-coded quantization[C]. Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, USA, 2009, (5): 1-14. 被引量:1
10Fridrich J, Goljan M, and Soukal D. Efficient wet paper codes[C]. Proceedings of 7th International Workshop on Information Hiding, Barcelona, Spain, 2005, LNCS 3727: 204-218. 被引量:1