|
參考文獻 [1]F. Balado, “Optimum Reversible Data Hiding and Permutation Coding”, 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, Nov. 2015, pp. 1 – 4 [2]P. Das, S. Kushwaha and M. Chakraborty, “Data Hiding Using Randomization and Multiple Encrypted Secret Images”, 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, India, Apr. 2015, pp. 298 - 302 [3]I. Dragoi, D. Coltuc and I. Caciula, “Horizontal Pairwise Reversible Watermarking”, 2015 23rd European Signal Processing Conference (EUSIPCO), Nice, France, Sep. 2015, pp. 56 - 60 [4]B. Feng, W. Lu and W. Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, IEEE Transactions on Information Forensics and Security, Feb. 2015, pp. 243 – 255 [5]A. Houas, Z. Mokhtari, K. Melkemi and A. Boussaad, “A Novel Binary Image Encryption Algorithm Based on Diffuse Representation”, Engineering Science and Technology, an International Journal, Algeria, Dec. 2016, pp. 1887 - 1894 [6]H. Huang, F. Chang and Y. Lu, “Reversible Data Hiding with Prediction-Based Multi-Bit Embedding and Multi-Level Difference Alteration”, 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan, Aug. 2016, pp. 706 – 709 [7]S. Kumar and S. Mal, “Efficient Binary Data Hiding Technique in Boundary Points”, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, Feb. 2016, pp. 43 – 47 [8]K. Lin, “Digital Image Hidden in an Image Using N-Graylevel Encoding”, 2009 First International Conference on Information Science and Engineering, Nanjing, China, Dec. 2009, pp. 1720 – 1724 [9]Y. Lin, C. Wang, W. Chen, F. Lin and W. Lin, “A Novel Data Hiding Algorithm for High Dynamic Range Images”, IEEE Transactions on Multimedia, Jan. 2017, pp. 196 - 211 [10]Y. Lu and W. Lyu, “A Novel High-Capacity Reversible Data-Hiding Scheme Using Two Steganographic Images”, 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI), Shenyang, China, Oct. 2015, pp. 667 – 671 [11]A. Mohammed, H. Maraş and E. Elbasi, “A New Robust Binary Image Embedding Algorithm in Discrete Wavelet Domain”, 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), Astana, Kazakhstan, Oct. 2014, pp. 1 – 7 [12]SA. Parah, JA. Akhoon, JA. Sheikh, NA. Loan and GM. Bhat, “A High Capacity Data Hiding Scheme Based on Edge Detection and Even-Odd Plane Separation”, 2015 Annual IEEE India Conference (INDICON), New Delhi, India, Dec. 2015, pp. 1 – 5 [13]K. Patel and L. Ragha, “Binary Image Steganography in Wavelet Domain”, 2015 International Conference on Industrial Instrumentation and Control (ICIC), Pune, India, May 2015, pp. 1635 – 1640 [14]P. Puteaux, D. Trinel and W. Puech, “High-Capacity Data Hiding in Encrypted Images Using MSB Prediction”, 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, Finland, Dec. 2016, pp. 1 - 6 [15]Y. Shi, X. Li, X. Zhang, H. Wu and B. Ma, “Reversible Data Hiding : Advances in the Past Two Decades”, IEEE Access ( Volume: 4 ), May 2016, pp. 3210 – 3237 [16]H. Sun, H. Luo, T. Wu and OS. Mohammad, “A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution”, 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, Dec. 2015, pp. 1 - 7 [17]D. Xu and R. Wang, “Separable and Error-Free Reversible Data Hiding in Encrypted Images”, Signal Processing Volume 123, Jun. 2016, pp. 9 – 21 [18]C. T. Yang, Y. Wang and S. You, “A Data Hiding Method Based on Adaptive Divided Block Size with Exclusive-OR Operation on Binary Image”, International Conference on Internet Studies, Osaka, Japan, Jul. 2016 [19]W. Zhan, Z. Peng, Wien Hong, M. Chen and D. Wen, “A Secure Data Hiding Method Based on Patched Reference Table and Pixel Value Differencing Technique”, 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, Dec. 2015, pp. 1199 – 1202 [20]史上最大勒索病毒 全球逾百國13萬電腦受害,http://www.appledaily.com.tw/realtimenews/article/new/20170513/1117676/ [21]外交部「出國登錄」資訊遭駭 萬筆個資恐遭竊,http://news.ltn.com.tw/news/society/breakingnews/1967969 [22]米開朗基羅密碼,http://www.twword.com/wiki/%E7%B1%B3%E9%96%8B%E6%9C%97%E5%9F%BA%E7%BE%85%E5%AF%86%E7%A2%BC
|