References
[1]. X. P. Zhang, (2011). “Reversible data hiding in
encrypted image,” IEEE Signal Processing Letters, Vol.18,
No.4, pp.255-258.
[2]. W. J. Lu, A. Varna and M. Wu, (2011). “Secure video
processing: Problems and challenges,” Proceedings of
IEEE International Conference on Acoustic, Speech,
Signal Processing, Prague, Czech Republic, pp.
5856–5859.
[3]. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J.
Shokrollahi, G. Neven, and M. Barni, (2007). “Protection
and retrieval of encrypted multimedia content: when
cryptography meets signal processing,” EURASIP Journal
on Information Security, Vol. 7, No. 2, pp. 1–20.
[4]. Sadeghi, T. Schneider, and I. Wehrenberg, (2009).
“Efficient privacy-preser ving face recognition,”
International Conference on Information Security and
Cryptology.
[5]. Zhao, W. D. Kou, and H. Li, (2010). “Effective
watermarking scheme in the encrypted domain for
buyer-seller watermarking protocol,” Information
Science, Vol. 180, No. 23, pp. 4672–4684.
[6]. W. Puech, M. Chaumont, and O. Strauss, (2008). “A
reversible data hiding method for encrypted images,”
Proceedings of SPIE, Vol. 6819, pp. 68191E-1–68191E-9.
[7]. X. P. Zhang, (2011). “Reversible data hiding in
encrypted image,” IEEE Signal Processing Letters, Vol. 18,
No. 4, pp. 255–258.
[8]. W. Hong, T. S. Chen, and H. Y. Wu, (2012). “An
improved reversible data hiding in encrypted images
using side match,” IEEE Signal Processing Letters, Vol. 19,
No. 4, pp. 199–202.
[9]. K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li,
(2013). “Reversible data hiding in encrypted images by
reserving room before encryption,” IEEE Transactions on
Information Forensics Security, Vol. 8, No. 3, pp. 553–562.
[10]. S. G. Lian, Z. X. Liu, and Z. Ren, (2007).
“Commutative encryption and watermarking in video
compression,” IEEE Transactions on Circuits Systems Video
Technology, Vol. 17, No. 6, pp. 774–778.
[11]. V. Manjula, J. Rajani, and K. Radhika, (2012). “A
Secure Data Hiding Technique in Compressed Video
Using a Secret Key,” International Journal of Computer
Science and Information Technologies, Vol. 3, No. 5, pp.
5097 – 5100.
[12]. S. W. Park and S. U. Shin, (2008). “Combined scheme
of encryption and watermarking in H.264/scalable video
coding (SVC),” New Directions Intellectual Interactive
Multimedia, Vol. 142, No. 1, pp. 351–361.
[13]. D. K. Zou and J. A. Bloom, (2010). “H.264 stream
replacement watermarking with CABAC encoding,”
Proceedings of IEEE ICME, Singapore, pp. 117–121.
[14]. D. W. Xu and R. D. Wang, “Watermarking in
H.264/AVC compressed domain using Exp-Golomb code
words mapping,” Optical Engineering, Vol. 50, No. 9, pp.
097402.