|
[1]“DES Encryption Standard (DES),” National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, Apr. 1997. [2]R. L Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communication of ACM, Feb. 1978, pp. 120-126. [3]張真誠、黃國峰、陳同孝,電子影像技術。台北: 旗標,民國92年。 [4]張真誠、黃國峰、陳同孝,數位影像處理技術。台北: 旗標,民國93年。 [5]王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室,資訊與網路安全-秘密通訊與數位鑑識新技法。台北: 博碩文化,民國95年。 [6]F. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding: A Survey,” Proceedings of the IEEE: special issue on Protection of Multimedia Content, Vol. 87, 1999, pp. 1062-1078. [7]M. Naor and A. Shamir, “Visual Cryptography,” Eurocrypt94, Lecture Notes in Computer Science, Springer-Verlag, Perugia, Italy, 1994, pp. 1-12. [8]C. N. Yang and C. S. Laih, “New Colored Visual Secret Sharing Schemes, ” Designs, Codes and Cryptography, Vol. 20, 2000, pp. 325-335. [9]C. Blundo, A. De Santis, and M. Naor, “Visual Cryptography for Grey Level Images,” Information Processing Letters, Vol. 75, 2000, pp. 255-259. [10]C. Blundo, A. De Bonis, and A. De Santis, “Improved Schemes for Visual Cryptography,” Designs, Codes and Cryptography, Vol. 24, No. 3, 2001, pp. 255-278. [11]C. C. Lin and W. H. Tsai, “Visual Cryptography for Gray-level Images by Dithering Techniques,” Pattern Recognition Letters, Vol. 24, No. 1-3, 2003, pp. 349-358. [12]G. Ateniese, C. Blundo, A. Santis, and D. R. Stinson, “Visual Cryptography for General Access Structures,” Information and Computation, Vol. 129, 1996, pp. 86-106. [13]G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Extended Capabilities for Visual Cryptography,” Theoretical Computer Science, Vol. 250, No. 1-2, 2001, pp. 143-161. [14]P. A. Eisen and D. R. Stinson, “Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels,” Designs, Codes and Cryptography, Vol. 25, No. 1, 2002, pp. 15-61. [15]S. Droste, “New Results on Visual Cryptography”, Advances in Cryptology-CRYPTO ’96, LNCS 1109, Springer-Verlag, 1996, pp. 401-415. [16]W. P. Fang, “Friendly Progressive Visual Secret Sharing,” Pattern Recognition, Vol. 41, No. 4, 2008, pp. 1410-1414. [17]W. G. Tzeng and C. M. Hu, “A New Approach for Visual Cryptography,” Designs, Codes and Cryptography, Vol. 27, 2002, pp. 207-227. [18]C. C. Chang and R. J. Hwang, “A Simple Picture Hiding Scheme,” Computer Processing of Oriental Languages, Vol. 12, No. 2, 1998, pp. 237-247. [19]C. N. Yang, Y. H. Liang, and W. H. Chou, “New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel”, National Computer Symposium on Information security, 2001, pp. F074-F085. [20]C. N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, No. 4, 2004, pp. 481-494. [21]D. Wang, L. Zhang, N. Ma, and X. Li, “Two Secret Sharing Schemes Based on Boolean Operations,” Pattern Recognition, Vol. 40, No. 10, 2007, pp. 2776-2785. [22]R. Ito, H. Kuwakado, and H. Tanaka, “Image Size Invariant Visual Cryptography,” IEICE Trans. Fundamentals, Vol. E82-A, No.10, 1999. [23]V. Rijmen and B. Preneel, “Efficient Colour Visual Encryption for Shared Colors of Benetton”, Eurocrypto’96, Rump Session, Berlin, 1996. Available at http://www.iacr.org/conferences/ec96/rump/preneel.ps. [24]C. Y. Hou, “Visual Cryptography for Color Images,” Pattern Recognition, Vol. 36, 2003, pp. 1619-1629. [25]R. J. Hwang and C. C. Chang, “Hiding a Picture in Two Pictures,” Optical Engineering. Vol. 40, No. 3, 2001, pp. 342-351. [26]C. C. Thien and J. C. Lin, “Secret Image Sharing,” Computers & Graphics , Vol. 26, 2002, pp. 765-770.
|