|
[1] IDC Home : The premier global market intelligence firm. URL : http://www.idc.com/ [2] John Gantz and David Reinsel, “THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East,” December 2012. [Online]. Available: http://idcdocserv.com/1414. [3] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999. [4] Zhiwei Yu; Thomborson, C.; Chaokun Wang; Jianmin Wang; Rui Li, &;quot;A cloud-based watermarking method for health data security,&;quot; High Performance Computing and Simulation (HPCS), 2012 International Conference on, pp.642,647, 2-6 July 2012. [5] Murakami, K.; Hanyu, R.; Qiangfu Zhao; Kaneda, Y., &;quot;Improvement of security in cloud systems based on steganography,&;quot; Awareness Science and Technology and Ubi-Media Computing (iCAST-UMEDIA), 2013 International Joint Conference on, pp.503,508, 2-4 Nov. 2013. [6] Shih, F. Y. and Wu, Scott. Y. T., “Combinational Image Water Marking in The Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, 2003. [7] Chang, C. C., Chen, T. S., and Chung, L. Z., “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1-2, pp. 123-138, 2002. [8] Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, pp. 401-404, 2002. [9] Lee, W. B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, pp. 195-204, 2002. [10] Alturki, F. and Mersereau, R., “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, Thessaloniki, Greece, pp. 542-545, 2001. [11] Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,”IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. [12] Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color, and Gray-scale Images,” Magazine of IEEE Multimedia Special Issue on Security, Vol. 4, No. 4, pp. 22-28, 2001. [13] Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, pp. 61-75, 1999. [14] Feng, J. B., Lin, I. C., Tsai, C. S., and Chu, Y. P., “Reversible Watermarking: Current Status and Key Issues,” International Journal of Network Security, Vol. 2, No. 3, pp. 161-171, 2006. [15] S. Katzenbeisser and F. A. Petitcolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking, 1st ed. Norwood, MA, USA: Artech House, Inc., 2000. [16] How does SilentEye embed data in BMP format?, http://www.silenteye.org/embedding.html?i1s2 [17] National Institute of Standards and Technology. URL : http://www.nist.gov/ [18] J. Dean and S. Ghemawat, “MapReduce: simplified data processing on large clusters,” Commun. ACM, vol. 51, no. 1, pp.107–113, Jan. 2008. [19] J. R. Douceur and W. J. Bolosky, “A Large-scale Study of File-system Contents,” in Proceedings of the 1999 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, New York, NY, USA, 1999, pp. 59–70. [20] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The Google file system,” in Proceedings of the nineteenth ACM symposium on Operating systems principles, New York, NY, USA, 2003, pp. 29–43. [21] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber, “Bigtable: A Distributed Storage System for Structured Data,” ACM Trans. Comput. Syst., vol. 26, no. 2, pp. 4:1–4:26, Jun. 2008. [22] Hadoop Distributed File System (HDFS). URL : http://hadoop.apache.org/hdfs/. [23] Donald Miner and Adam Shook, MapReduce Design Patterns, AO&;#39;Reilly Media, 2012 [24] 劉豐豪
|