[1]賴溪松、韓亮、張真誠,“近代密碼學及其應用”,松崗電腦資料股份有限公司,ISBN 957-222-907-9,2000。
[2]M. M. Amin, M. Salleh, S. Ibrahim, and M. Z. I. Shamsuddin, “Information Hiding using Steganography,” IEEE National Conference on Telecommunication Technology, pp. 21-25, 2003.
[3]R. J. Anderson, and F. A. P. Petitcoals, “On The Limits of Steganography,” IEEE Journal of Selected Areas in Communication, Vol. 16, No. 4, pp. 474-481, 1998.
[4]W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for data hiding,” IBM System Journal, Vol. 35, No.3&4, 1996.
[5]F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding-A Survey,” Proceedings of IEEE, special issue on protection of multimedia content, Vol.87, No. 7, pp. 1062-1078, 1999.
[6]C. T. Hsu, and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol. 8, Issue 1, pp. 58-68, 1999.
[7]I. J. Cox, J. Kilian, F. T. Leighton, and T. shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on image processing, Vol. 6, No. 12, 1997.
[8]M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proceedings of the IEEE, Vol. 86, Issue 6, pp. 1064-1087.
[9]沈志益,“一個以JPEG偽裝影像格式的安全偽裝術”,逢甲大學通訊工程學系碩士論文,2006。[10]Y. S. Chen, C. Y. Gun, H. F. Lin, and C. Y. Chen, “An Improved Steganographic Method for Images by Pixel-value Differencing,” Proceedings of 2008 International Conference on Advanced Information Technologies, AIT, Apr. 2008.
[11]J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images,” Proceedings of the ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
[12]D. C. Wu, and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, Issue 9-10, pp. 1613-1626, 2003.
[13]H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings.-Vision, Image and Signal Processing, Vol. 152, Issue 5, pp. 611-615, 2005.
[14]C. H. Yang, S. J. Wang, and C. Y. Weng, “Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy,” Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP, Vol. 1, pp. 445-448, 2007.
[15]C. H. Yang, and C. Y. Weng, “A Steganographic Method for Digital Images by Multi-Pixel Differencing,” International Computer Symposium, ICS, pp. 611-615, 2006.
[16]K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tu, “A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal of Multimedia, Vol. 3, No. 2, 2008.
[17]C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” Journal of Systems and Software, Vol. 81, Issue 1, pp. 150-158, 2008.
[18]K. J. Kim, K. H. Jung, and K. Y. Yoo, “A High Capacity Data Hiding Method using PVD and LSB,” International Conference on Computer Science and Software Engineering, Vol. 3, pp. 876-879, 2008.
[19]張真誠、黃國峰、陳同孝,“電子影像技術”,旗標出版股份有限公司,ISBN 957-717-976-2,2003。
[20]陳同孝、張真誠、黃國峰,“數位影像技術”,旗標出版股份有限公司,ISBN 957-442-007-8,2003。
[21]呂慈純、陸哲明、張真誠,“多媒體安全技術”,全華圖書股份有限公司,ISBN 978-957-21-6018-3,2007。
[22]王旭正、柯建萱、ICCL資訊密碼暨建構實驗室,“資訊媒體安全-偽裝學與數位浮水印”,博碩文化股份有限公司,ISBN 978-986-201-021-1,2007。