|
[1] 資策會資訊試場情報中心,http://mic.iii.org.tw/intelligence/,2005-01-26. [2] 錢世傑、錢世豐、劉嘉明、張紹斌,電腦鑑識與企業安全,文魁資訊,民94 [3] 電腦鑑識,台灣網路危機處理暨協調中心,http://www.cert.org.tw/document/column/show.php?key=67,2003-09 [4] 林一德,國立台灣大學法律研究所,電子數位資料於證據法上之研究,民國89年 [5] Timothy Wright,The Field guide for investigation Computer Crime: search and seizure basic part three, security focus, 2000。 [6] J. Adams, K. Parulski, and K. Spaulding, Color processing in digital cameras,. Micro, IEEE, vol. 18, pp.20.30, Nov.-Dec 1998. [7] I. Avcibas, N. Memon, and B. sankur, .Steganalysis using image quality metrics.. IEEE transactions on Image Processing, January 2003. [8] 陳同孝、張真誠、黃國峰,數位影像處理技術,松岡圖書資料股份有限公司,2001 [9] SRI International (2001),”tsm API Library”, homepage of Digital Earth, 2001, http://www.tsmapi.com/geovrml.shtml。 [10] Kharrazi, M., Sencar, H. T., and Memon, N.: ”Blind Source Camera Identification”, Proc. ICIP’ 04, Singapore, October 24-27,2004. [11] Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, .Methods for identification of images acquired with digital cameras,. Proc. SPIE Vol. 4232, p. 505-512, Enabling Technologies for Law Enforcement and Security, 2001. [12] C.-C. Chang and C.-J. Lin, LIBSVM: a library for support vector machines, 2001, software available at,http://www.csie.ntu.edu.tw/.cjlin/libsvm. [13] DCView數位視野—數位相機、攝影專業網站,http://www.dcview.com.tw/
|