[1] |
MICROSOFT. Security Engineering[EB/OL]. https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling, 2020-5-15.
|
[2] |
THEISEN, CHRISTOPHER, MUNAIAH, et al. Attack Surface Definitions: A Systematic Literature Review[EB/OL]. https://www.researchgate.net/publication/326659184_Attack_surface_definitions_A_systematic_literature_review, 2020-5-15.
|
[3] |
XIANG S J, LUO X R. Efficient Reversible Data Hiding in Encrypted Image with Public Key Cryptosystem[J]. EURASIP Journal on Signal Processing in Signal Processing, 2017,17(1):59.
|
[4] |
LI J, LIANG X, DAI C, et al. Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain[J]. Entropy. 2019,21(7):625.
doi: 10.3390/e21070625
URL
|
[5] |
XIONG L Z, DONG D P, XIA Z H, et al. High-Capacity Reversible Data Hiding for Encrypted Multimedia Data with Somewhat Homomorphic Encryption[J]. IEEE Access, 2018,6(10):60635-60644.
doi: 10.1109/ACCESS.2018.2876036
URL
|
[6] |
WU H T, CHEUNG Y M, ZHUANG Z W, et al. Reversible Data Hiding in Homomorphic Encrypted Images without Preprocessing[EB/OL]. https://www.semanticscholar.org/paper/Reversible-Data-Hiding-in-Homomorphic-Encrypted-Wu-Cheung/1ef843b4c643a8e53fd56dfe19dc30da7707ea28, 2020-3-15.
|
[7] |
KHAN A N, FAN M Y, NAZEER M I, et al. An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain[J]. Electronics, 2019,8(6):682.
doi: 10.3390/electronics8060682
URL
|
[8] |
ZHOU N, ZHANG M Q, WANG H, et al. Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU[J]. IEEE Access, 2020,8(1):81412-81424.
doi: 10.1109/Access.6287639
URL
|
[9] |
ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE[J]. Journal of Electronics and Information Technology, 2016,38(2):354-360.
doi: 10.11999/JEIT150702
URL
|
|
张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016,38(2):354-360.
doi: 10.11999/JEIT150702
URL
|