[1] 李遠坤、陳玲惠(1999),「數位影像之資訊隱藏技術探討」,資訊安全通訊,第五卷,第四期,第18-30頁。
[2] 葉秀蓮(2007),植基於預測編碼之可回復式資訊隱藏技術,碩士論文,靜宜大學資訊管理系,臺中。[3] N. Ahmed, T. Natarajan and K. R. Rao(1974), “Discrete Cosine Transform,” IEEE Transactions on Computers, Vol. C-32, pp. 90-93.
[4] A. M. Alattar(2004), “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156.
[5] W. Bender, D. Gruhl, N. Morimoto and A. Lu(1996), “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336.
[6] E. O. Brigham and R. W. Morrow(1967), “The Fast Fourier Transform,” IEEE Spectrum, Vol. 4, pp. 63-70.
[7] S. Cacciaguerra and S. Ferretti(2002), “Data Hiding: Steganography and Copyright Marking,” http://www.cs.unibo.it/~scacciag.
[8] H. Y. Chang(1999), “Data Hiding and Watermarking in Color Images by Wavelet Transforms,” Master Thesis, Department of Computer and Information Science, National Chiao Tung University, Taiwan, Republic of China.
[9] T. S. Chen, C. C. Chang and M. S. Hwang(1998), “A Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485-1488.
[10] M. Fallahpour and M. H. Sedaaghi(2007), “High Capacity Lossless Data Hiding Based on Histogram Modification,” IEICE Electronics Express, Vol. 4, No. 7, pp. 205-210.
[11] C. P. Hsieh and H. W. Tseng(2006), “Reversible Data Hiding by Histogram Modification,” The 19th IPPR Conference on Computer Vision, Graphics and Image Processing(CVGIP2006), Taoyuan, Taiwan, August 13-15.
[12] Y. H. Kim, H. Kang, K. Kim and S. S. Han(2002), “A Digital Audio Watermarking Using Two Masking Effects,” Proceedings of the 3rd IEEE Pacific-Rim Conference on Multimedia 2002, LNCS 2532, Springer-Verlag Berlin Heidelberg, pp. 655-662.
[13] G. G. Langdon(1984), “An Introduction to Arithmetic Coding,” IBM Journal of Research and Development, Vol. 28, No. 2, pp. 135-149.
[14] Y. K. Lee and L. H. Chen(2000), “High Capacity Image Steganographic Model,” IEE Proceedings of Vision, Image and Signal Processing, Vol. 16, pp. 288–294.
[15] Y. Linde, A. Buzo and R. M. Gray(1980), “An Algorithm for Vector Quantization,” IEEE Transactions on Communications, Vol. 28, pp. 84-95.
[16] S. S. Maniccam and N. Bourbakis(2004), “Lossless Compression and Information Hiding in Images,” Pattern Recognition, Vol. 37, pp. 475-486.
[17] J. Mielikainen(2006), “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287.
[18] Z. Ni, Y. Q. Shi, N. Ansari and W.Su(2006), “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362.
[19] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn(1999), “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078.
[20] B. Pfitzmann(1996), “Information Hiding Terminology,” Proceedings of the First Workshop on Information Hiding, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Cambridge, UK, pp. 347-350.
[21] J. Tian(2003), “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890–896.
[22] D. C. Wu and W. H. Tsai(2003), “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1626.