|
[1]Data Encryption Standard, Federal Information Processing Standard (FIPS) 46, Nat. Bur. Stand., Jan. 1977 [2]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transaction on Information and Theory, Vol. IT-22, pp. 644-654, Nov. 1976. [3]RL Rivest, A Shamir, L Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978 [4]M. Van Droogenbroeck, Introduction to PKI- Public Key Infrastructure, European Master in Multimedia Projects, Vol. 1, Feb. 2002 [5]R. Hunt, Technological infrastructure for PKI and digital certification, Computer Communications, Vol. 24, Issue 14, pp. 1460-1471, Sep. 2001 [6]International Telecommunication Union (ITU) URL http://www.itu.int/home/imt.html. [7]R. Housley, W. Ford, W. Polk, D. Solo, Internet X. 509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, Jan. 1999 [8]W. Stallings, Cryptography and Network Security (Third Edition), Prentice Hall [9]C. Ellison, B. Schneier, Ten Risks of PKI: What You’re not Being Told Public Key Infrastructure, Computer Security Journal, Vol. 16, No. 1, pp. 1-7 , 2000 [10]C.-S. Laih and K.-Y. Chen, Generating Visible RSA Public Keys for PKI, International Journal of Information Securit, pp. 103-109, Jan. 2004 [11]C.-S. Laih and J.-W. Hung, “Variants of Certificates and Their Applications in Public Key Infrastructure”, 研考雙月刊, Vol. 29, Issue 1, pp. 53-67, Feb. 2005 [12]C.-C. Thien, J.-C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition, Vol. 36, Issue 12, pp. 2875-2881, Dec. 2003 [13]Y.-H. Yu, C.-C. Chang, I.-C. Lin, A new steganographic method for color and grayscale image hiding, Computer Vision and Image Understanding, Vol. 107, Issue 3, pp. 183-194, Sept. 2007 [14]M. T. Hogan, F. Balado, G.C.M. Silvestre and N.J. Hurley, Secure and robust steganography using side information at the encoder, Information Security, IEE Proceedings, Vol. 153, Issue 3, pp. 87-95, Sept. 2006 [15]Y. Hu and B. Jeon, Reversible Visible Watermarking and Lossless Recovery of Original Images, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 11, pp. 1423-1429, Nov. 2006 [16]S.-C. Pei and Y.-C. Zeng, A Novel Image Recovery Algorithm for Visible Watermarked Images, IEEE Transactions on Information Forensics and Security, Vol. 1, Issue 4, pp. 543-550, Dec. 2006 [17]Y.-J. Hu; S. Kwong, and J.-W. Huang, An algorithm for removable visible watermarking, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 1, pp. 129-133, Jan. 2006 [18]P.-L. Lin, Digital watermarking models for resolving rightful ownership and authenticating legitimate customer, Journal of Systems and Software, Vol. 55, Issue 3, pp. 261-271, Jan. 2001 [19]C.-C. Chang, Y.-S. Hu and T.-C. Lu, A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Letters, Vol. 27, Issue 5, pp. 439-446, Apr. 2006 [20]S.-H. Liu, H.-X. Yao, W.-G. and Y.-L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, Vol. 185, Issue 2, pp. 869-882, Feb. 2007
|