共 21 条
- [1] Hsu C.Y., Lu C.S., Pei S.C., Image feature extraction in encrypted domain with privacy-preserving SIFT, IEEE Trans. on Image Processing, 21, 11, pp. 4593-4607, (2012)
- [2] Creeger M., Cloud computing: An overview, ACM Queue, 7, 5, pp. 1-5, (2009)
- [3] Hurwitz J., Bloor R., Kaufman M., Halper F., Cloud Computing for Dummies, (2009)
- [4] Chow R., Golle P., Jakobsson M., Shi E., Staddon J., Masuoka R., Molina J., Controlling data in the cloud: Outsourcing computation without outsourcing control, Proc. of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85-90, (2009)
- [5] Lagendijk R.L., Zekeriya E., Barni M., Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Processing, 30, 1, pp. 82-105, (2013)
- [6] Feng D.G., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, Ruan Jian Xue Bao/Journal of Software, 22, 1, pp. 71-83, (2011)
- [7] Zhang X.P., Reversible data hiding in encrypted image, IEEE Signal Processing Letters, 18, 4, pp. 255-258, (2011)
- [8] Zheng H.Y., Gao Z., Xiao D., Novel reversible data embedding algorithm for encrypted image, Computer Engineering and Applications, 50, 7, pp. 186-189, (2014)
- [9] Hong W., Chen T.S., Wu H.Y., An improved reversible data hiding in encrypted image using side match, IEEE Signal Processing Letters, 19, 4, pp. 199-202, (2012)
- [10] Hong W., Chen T.S., Kao Y.H., Reversible data embedment for encrypted cartoon images using unbalanced bit flipping, Advances on Swarm Intelligence Lecture Notes in Computer Science, 7929, pp. 208-214, (2013)