[1] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381. YU Neng-hai,HAO Zhuo,XU Jia-jia,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,41(2):371-381.(in Chinese) [2] ZHANG W,WANG H,HOU D,et al.Reversible data hiding in encrypted images by reversible image transformation[J].IEEE Transactions on Multimedia,2016,18(8):1469-1479. [3] 马燕.苹果确认用户iCloud遭入侵隐私安全体系或存漏洞[OL].https://tech.qq.com/a/20180309/003008.html,2018-03-09. [4] SHI Y Q,LI X,ZHANG X,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237. [5] ZHANG Xin-peng.Separable reversible data hiding in encrypted image[J].IEEE Transactions on Information Forensics and Security,2012,7(2):826-832. [6] HUANG F,HUANG J,SHI Y.New framework for reversible data hiding in encrypted domain[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2777-2789. [7] 鄢舒,陈帆,和红杰.异或-置乱框架下邻域预测加密域可逆信息隐藏[J].计算机研究与发展,2018,55(6):1211-1221. YAN Shu,CHEN Fan,HE Hong-jie.Reversible data hiding in encrypted image based on neighborhood prediction using XOR-Permutation encryption[J].Journal of Computer Research and Development,2018,55(6):1211-1221.(in Chinese) [8] CAO X,DU L,WEI X,et al.High capacity reversible data hiding in encrypted images by patch-level sparse representation[J].IEEE Transactions on Cybernetics,2016,46(5):1132-1143. [9] PAULINE P,WILLIAM P.An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681. [10] LIU Z,PUN C.Reversible data hiding in encrypted images by redundant space transfer[J].Information Sciences,2018,433-434:188-203. [11] 王继军,孙泽锐,李国祥.图像抛物线插值空间大容量可逆信息隐藏算法[J].电子学报,2019,47(1):139-146. WANG Ji-jun,SUN Ze-rui,LI Guo-xiang.High capacity reversible data hiding algorithm based on parabolic interpolation space[J].Acta Electronica Sinica,2019,47(1):139-146.(in Chinese) [12] LI S,LI C,CHEN G,et al.A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J].Signal Processing:Image Communication,2008,23(3):212-223. [13] 林青,王延江,王珺.基于超混沌系统的图像加密算法[J].中国科学:技术科学,2016,46(9):910-918. LIN Q,WANG Y J,WANG J.The image encryption scheme with optional dynamic state variables based on hyperchaotic system[J].Scientia Sinica (Technologica),2016,46(9):910-918.(in Chinese) [14] KHELIFI F.On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain[J].Signal Processing,2018,143:336-345. [15] LI C,LO K T.Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J].Signal Processing:Image Communication,2009,91(4):949-954. [16] LI S,LI C,LO K T,et al.Cryptanalysis of an image scrambling scheme without bandwidth expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2008,18(3):338-349. [17] JOLFAEI A,WU X,et al.On the security of permutation-only image encryption schemes[J].IEEE Transactions on Information Forensics and Security,2016,11(2):235-246. [18] 王念平.一类分组密码变换簇抵抗线性密码分析的安全性评估[J].电子学报,2020,48(1):137-142. WANG Nian-ping.Security evaluation against linear cryptanalysis for a class of block cipher transform cluster[J].Acta Electronica Sinica,2020,48(1):137-142.(in Chinese) [19] 范九伦,张雪锋,刘宏月.密码学基础[M].西安:西安电子科技大学出版社,2008.6-12. FAN Jiu-lun,ZHANG Xue-feng,LIU Hong-yue.Fundamentals of Cryptography[M].Xi'an:Xidian University Press,2008.6-12.(in Chinese) |