[1] 林志昌、王智弘,“數位影像認證技術之發展與新趨勢”,資訊安全通訊,第十卷,第一期,第93-107頁,2004年1月。[2] Stallings, W., Cryptography and Network Security, Prentice Hall, New Jersey, 2003.
[3] Rivest, R., “The MD5 Message Digest Algorithm,” Internet Request for Comments 1321, 1992.
[4] Rivest, R., Shamir, A., and Adleman, L., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, February, 1978.
[5] Skraparlis, D., “Design of an Efficient Authentication Method for Modern Image and Video,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, pp. 417-426, May, 2003.
[6] Schneider, M. and Chang, S.-F., “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of the 1996 IEEE International Conference on Image Processing, Lausanne, Switzerland, Vol. 3, pp. 227-230, September, 1996.
[7] Bhattacharjeeand, S., and Kutter, M., “Compression Tolerant Image Authentication,” Proceedings of the IEEE International Conference on Image Processing, Chicago, United States, Vol. 1, pp. 435-439, October, 1998.
[8] Lou, D.-C. and Liu, J.-L., “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 31-39, February, 2000.
[9] Lin, C.-Y. and Chang, S.-F., “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Transactions on Circuits and Systems of Video Technology, Vol. 11, No. 2, pp. 153-168, February, 2001.
[10] Lu, C.-S. and Liao, M. H.-Y., “Structural Digital Signature for Image Authentication: an Incidental Distortion Resistant Scheme,” IEEE Transactions on Multimedia, Vol. 5, No. 2, pp. 161-173, June, 2003.
[11] Taubman, D. S. and Marcellin, M. W., JPEG 2000 Image Compression Fundamental, Standard and Practice, Kluwer Academic Publishhers, 2001.
[12] Taubman, D. S. and Marcellin, M. W., “JPEG 2000: Standard for Interactive Imaging,” Proceeding of the IEEE, Vol. 90, No. 8, pp. 1336-1357, August, 2002.
[13] Information Technology - JPEG 2000 Image Coding System-Part 8: Secure JPEG 2000, ISO/IEC Committee Draft 15444 - 8, 2004.
[14] Digital Compression and Coding of Continuous - Tone Still Images: Requirements and Guidelines, ISO/IEC International Standard 10918-1, 1992.
[15] Information Technology - JPEG 2000 Image Coding System, ISO/IEC Final Committee Draft 15444-1, 2000.
[16] 吳炳飛、胡益強、瞿忠正、蘇崇彥,JPEG 2000影像壓縮技術,全華科技圖書股份有限公司,台北,2003。
[17] Christopoulos, C., Skodras, A., and Ebrahimi, T., “The JPEG 2000 Still Image Coding System: An Overview,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 1103-1127, November, 2000.
[18] 戴顯權、陳政一,JPEG 2000,紳藍出版社,高雄,2002。
[19] Rabbani, M. and Joshi, R., “An Overview of the JPEG 2000 Still Image Compression Standard,” Signal Processing: Image Communication, Vol. 17, No. 1, pp. 3-48, January, 2002.
[20] http://www.jpeg.org/jpeg2000/index.html.
[21] Chen, W.-H., Smith, C. H., and Fralick, S. C., “A Fast Computational Algorithm for the Discrete Cosine Transform,” IEEE Transactions on Communications, Vol. 25, No. 9, pp. 1004-1009, September, 1977.
[22] Antonini, M., Barlaud, M., Mathieu, P., and Daubechies, I., “Image Coding Using the Wavelet Transform,” IEEE Transactions on Image Processing, Vol. 1, No. 2, April, 1992.
[23] 陳同孝,張真誠、黃國峰,數位影像處理技術,旗標出版股份有限公司,台北,2003。
[24] Sweldens, W., “The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets,” Applied and Computational Harmonic Analysis, Vol. 3, No. 2, pp. 186-200, April, 1996.
[25] Sweldens, W., “The Lifting Scheme: A Construction of Second Generation Wavelets,” SIAM Journals Mathematics Annual, Vol.29, No.2, pp. 511-546, March, 1998
[26] Adams, M. D. and Kossentini, F., “Reversible Integer - to - Integer Wavelet Transform for Image Compression: Performance Evaluation and Analysis,” IEEE Transactions on Image Processing, Vol. 9, No. 6, pp. 1010-1024, June, 2000.
[27] Shapiro, J. M., “Embedded Image Coding Using Zerotrees of Wavelet Coefficients,” IEEE Transactions on Signal Processing, Vol. 41, No. 12, pp.3445-3462, December, 1993.
[28] Said, A. and Pearlman, W. A., “A New Fast and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees,” IEEE Transactions on Circuits and System for Video Technology, Vol. 6, No. 3, pp. 243-250, June, 1996.
[29] Taubman, D., “High Performance Scalable Image Compression with EBCOD,” IEEE Transactions on Image Process, Vol. 9, No. 7, pp. 1158-1170, July, 2000.
[30] Sun, Q. and Chang, S.-F., “A Secure and Robust Digital Signature Scheme for JPEG2000 Image Authentication,” IEEE Transactions on Multimedia, Vol. 7, No. 3, pp. 480-494, June, 2005.
[31] Grosbois, R., Gerbelot, P. and Ebrahimi, T., “Authentication and Access Control in the JPEG 2000 Compressed Domain,” Proceedings of the SPIE - Applications for Digital Image Processing XXIV, San Diego, United States, Vol. 4472, pp. 95-104, July, 2001.
[32] Peng, C., Deng, R., Wu, Y., and Shao, W., “A Flexible and Scalable Authentication Scheme for JPEG 2000 Codestreams,” Proceedings of the Eleventh ACM International Conference on Multimedia, Berkeley, United States, pp. 433-441, November, 2003.
[33] Wu, Y., Ma, D., and Deng, R. H., “Progressive Protection of JPEG 2000 Codestreams,” Proceedings of the IEEE International Conference on Image Processing, Singapore, Vol. 5, pp. 3447-3450, October, 2004.
[34] http://jj2000.epfl.ch/.
[35] http://www.irfanview.com/.