[1] SHAO Q F, ZHANG Z, ZHU Y C, et al. Survey of enterprise blockchains. Journal of Software, 2019, 30(9): 2571 -2592 (in Chinese).
[2] OU D H, WU X T, DAI L, et al. Improved tagged visual cryptograms by using random grids. Proceedings of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW’13), 2013, Oct 1 - 4, Auckland, New Zealand. LNCS 8389. Berlin, Germany: Springe, 2014: 79 -94.
[3] HOU Y C, QUAN Z Y, TSAI C F, et al. Block-based progressive visual secret sharing. Information Sciences, 2013, 233: 290 - 304.
[4] DING H Y. High quality ( k,n) visual cryptography based on secret sharing. Application Research of Computers, 2019, 36(8): 2449 -2453 (in Chinese).
[5] YAN X H, WANG S, NIU X M, et al. Halftone visual cryptography with minimum auxiliary black pixels and uniform
image quality. Digital Signal Processing, 2015, 38: 53 -65.
[6] DING H Y, LI Z C, BI W. (k,n) halftone visual cryptography based on Shamir’s secret sharing. The Journal of China Universities of Posts and Telecommunications, 2018, 25(2): 60 -76.
[7] BAYER B E. An optimum method for two-level rendition of continuous-tone pictures. Proceedings of the 1973 IEEE
International Communication Conference: Vol 1, 1973, Jun 11 -13, Seattle, WA, USA. Piscataway, NJ, USA: IEEE, 1973:
26. 11 -26. 15.
[8] ULICHNEY R. The void-and-cluster method for dither array generation. Proceedings of the SPIE, 1993, 1913: 332 -343.
[9] JARVIS J F, JUDICE C N, NINKE W H. A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics and Image Processing, 1976, 5(1): 13 -40.
[10] LI X. Edge-directed error diffusion halftoning. IEEE Signal Processing Letters, 2006, 13(11): 688 -690.
[11] KNUTH D E. Digital halftones by dot diffusion. ACM Transactions on Graphics, 1987, 6(4): 245 -273.
[12] GUO J M, LIU Y F. Improved dot diffusion by diffused matrix and class matrix co-optimization. IEEE Transactions on Image Processing, 2009, 18(8): 1804 -1816.
[13] LIU Y F, GUO J M. New class tiling design for dot-diffused halftoning. IEEE Transactions on Image Processing, 2013, 22(3): 1199 -1208.
[14] GOYAL P, GUPTA M, STAELIN C, et al. Clustered-dot halftoning with direct binary search. IEEE Transactions on Image Processing, 2012, 21(2): 473 -487.
[15] GUO J M, LIU Y F, CHANG J Y. High efficient direct binary search using multiple lookup tables. Proceedings of the 19th IEEE International Conference on Image Processing, 2012, Sept 30 - Oct 3, Orlando, FL, USA. Piscataway, NJ, USA: IEEE, 2012: 813 -816.
[16] ZHANG X J, ALLEBACH J P. Quad-interleaved block level parallel direct binary search algorithm. Proceedings of the 2016 IS&T International Symposium on Electronic Imaging Science and Technology, 2016, Feb 14 - 18, San Francisco, CA, USA. Morehouse Lane Red Hook, NY, USA: Curran Associates Inc, 2016: 1 -6.
[17] LIAN S, DING H Y, LI Z C. Research on reversible watermarking algorithms in image encryption domain based on ZUC algorithms. Proceedings of the 3rd International Conference on Mechanical and Electronics Engineering ( ICMEE’19 ), 2019, Nov 29 - 30, Chongqing, China. Taiyuan, China: Clausius Scientific Press, China Office, 2019: 147 -155.
[18] State Cryptography Administration. ZUC strearm cipher algorithm, part 2: the ZUC-based confidentiality algorithm. GM/ T 0001. 2 - 2012. Beijing, China: China Standards Press, 2002 ( in Chinese).
[19] ZHANG X P. Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 2011, 18(4): 255 -258.
[20] LI F Y, LI J G. Reversible information hiding in encrypted image based on block rotation. Journal of Shanghai University of Electric Power, 2018, 34(1): 46 -52 (in Chinese).
[21] HUANG M X, HE H J, CHEN F. Separable reversible data hiding in encrypted image against ciphertext-only attack. Journal of Computer-Aided Design & Computer Graphics, 2020, 32 (6): 874 -882 (in Chinese).
[22] KIM C, SHIN D, LENG L, et al. Separable reversible data hiding in encrypted halftone image. Displays, 2018, 55: 71 -79.
|