共 26 条
- [1] Li F.H., Li H., Jia Y., Et al., Privacy computing: concept, connotation and its research trend, Journal on Communications, 37, 4, pp. 1-11, (2016)
- [2] The 43rd China statistical report on internet development
- [3] Li W.H., Cao J., Li H., Privacy self-correlation privacy-preserving scheme in LBS, Journal on Communications, 40, 5, pp. 57-66, (2019)
- [4] Wang X.Y., Niu B., Li F.H., Et al., Risk assessing and privacy-preserving scheme for privacy leakage in APP, Journal on Communications, 40, 5, pp. 13-23, (2019)
- [5] Yan W.B., Yao Y.Z., Zhang W.M., Et al., Privacy-preserving scheme for logistics systems based on 2D code and information hiding, Chinese Journal of Network and Information Security, 3, 11, pp. 22-28, (2017)
- [6] Mohanty S.P., Ramakrishnan K.R., Kankanhalli M.S., A DCT domain visible watermarking technique for images, International Conference on Multimedia and Expo, pp. 1029-1032, (2000)
- [7] Shi Y.Q., Li X., Zhang X., Et al., Reversible data hiding: advances in the past two decades, IEEE Access, 4, pp. 3210-3237, (2016)
- [8] Hu Y., Jeon B., Reversible visible watermarking and lossless recovery of original images, IEEE Transactions on Circuits and Systems for Video Technology, 16, 11, pp. 1423-1429, (2006)
- [9] Yip S.K., Au O.C., Ho C.W., Et al., Lossless visible watermarking, International Conference on Multimedia and Expo, pp. 853-856, (2006)
- [10] Tsai H.M., Chang L.W., A high secure reversible visible watermarking scheme, International Conference on Multimedia and Expo, pp. 2106-2109, (2007)