References
[1] Naor. N. and A. Shamir, “Visual cryptography, advances in cryptography,” Eurocrypt'' 94, Lecture Note in Computer Science Springer-Verlag, pp. 1-12, 1994.
[2]M. Al-khassawneeh and S. Aviyente, "Robust watermarking on the joint spatial-spectral domain," IEEE Signal Processing Education Workshop, pp. 297 - 301, 2004.
[3]A. Miyazaki and A. Okamoto, "Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems," IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 1969 - 1972, 2001.
[4]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Image Processing, IEEE Transactions, vol. 6, pp. 1673 - 1687 1997.
[5]A. B. Piva, F., Cappellini, V. and Barni, M., "Exploiting the cross-correlation of RGB-channels for robust watermarking of color images " International Conference on Image Processing, vol. 1, pp. 306 -310, 1999.
[6]X.-M. Niu, Z.-M. Lu, and S.-H. Sun, "Digital watermarking of still images with gray-level digital watermarks," Consumer Electronics, IEEE Transactions, vol. 46, pp. 137 - 145 2000.
[7]Kwok, S.H., Yang, C.C. and Tam, K.Y. "Watermark design pattern for intellectual property protection in electronic commerce applications," Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 2, pp. 10, 2000.
[8]Y. Hu, K. S., and J. Huang, "Using invisible watermarks to protect visibly watermarked images," International Symposium on Circuits and Systems, vol. 5, pp. V-584 - V-587, 2004.
[9]D. Yu, F. Sattar, and S. G. Razul, "Transparent robust information hiding for ownership verification," IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. iii - 401-4, 2004.
[10] Ping Wah Wong and Memon, N., "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593 - 1601, 2001.
[11] C.-F. Wu and W.-S. Hsieh, "Digital watermarking using zerotree of DCT," Consumer Electronics, IEEE Transactions on, vol. 46, pp. 87 - 94 2000.
[12] J. Huang, Y. Q. Shi, and Y. Shi, "Embedding image watermarks in dc components," IEEE Transactions on Circuits and Systems for Video Technology, vol. 10, pp. 974 - 979 2000.
[13] C.-T. Hsu and J.-L. Wu, "Hidden digital watermarks in images " IEEE Transactions on Image Processing, vol. 8, pp. 58 -68, 1999.
[14] R. Dugad, K. Ratakonda, and N. Ahuja, "A new wavelet-based scheme for watermarking images," International Conference on Image Processing, vol. 2, pp. 419 - 423, 1998.
[15] M. Ramkumar, A. N. Akansu, and A. A. Alatan, "A robust data hiding scheme for images using DFT," International Conference on Image Processing, vol. 2, pp. 211 - 215, 1999.
[16] A. Kejariwal, "Watermarking," Potentials, IEEE, vol. 22, pp. 37 - 40, 2003.
[17] K.-H. Bae and S.-H. Jung, "A study on the robustness of watermark according to frequency band," IEEE International Symposium on Industrial Electronics, vol. 3, pp. 2017 - 2021, 2001.
[18] 陳同孝、張真誠、黃國峰,數位影像處理技術,台北:松崗電腦圖書,2001。
[19] M.-J. Tsai, K.-Y. Yu, and Y.-Z. Chen, "Wavelet Packet and Adaptive Spatial Transformation of Watermark for Digital Image Authentication," International Conference on Image Processing, vol. 1, pp. 450 - 453, 2000.
[20] 蔡盛同,以修改型灰階視覺密碼為基礎的非對稱性浮水印技術,碩士論文,交通大學資訊科學與工程研究所,2006。[21] 張真誠、黃國峰、陳同孝,電子影像技術(Electronic Imaging Techniques), 台北:松崗電腦圖書,2000。
[22] A. Houmansadr and S. Ghaemmaghami, "A Novel Video Watermarking Method Using Visual Cryptography," Engineering of Intelligent Systems, 2006 IEEE International Conference pp. 1 - 5, 2006.
[23] Y. T. Hsu and L. W. Chang, "A new construction algorithm of visual crytography for gray level images," IEEE International Symposium on Circuits and Systems, pp. 4 pp., 2006.
[24] Z. Zhou, A. G.R., and G. Di Crescenzo, "Halftone visual cryptography," Image Processing, IEEE Transactions, vol. 15, pp. 2441 - 2453, 2006.
[25] D. Socek and S. S. Magliveras, "General access structures in audio cryptography," IEEE International Conference on Electro Information Technology, pp. 6 pp., 2005.
[26] Q. B. Sun, P. R. Feng, and R. Deng, "An optical watermarking solution for authenticating printed documents," International Conference on Information Technology: Coding and Computing, pp. 65 - 70 2001.
[27] A. De Santis, "On visual cryptography schemes," Information Theory Workshop, pp. 154 - 155 1998.
[28] D. Stinson, "Visual cryptography and threshold schemes," Potentials, IEEE, vol. 18, pp. 13 - 16, 1999.
[29] Y.-C. Hou and S.-F. Tu, "Visual Cryptography Techniques for Color Images without Pixel Expansion," Journal of Information, Technology and Society, vol. 4, pp. 1, 2004.
[30] R. E. Gonzalez R. C. and Woods, "Digital Image Processing, 2nd Edition," Prentice-Hall, New Jersey, 2002.
[31] 林佳宏,不需擴展的彩色視覺密碼,碩士論文,國立中央大學資訊管理研究所,2002。[32] C. Bunks, "Grokking the GIMP," 1st Edition, New Riders Publishing; ISBN: 0735709246, 2000.
[33] G. V. a. I. Pitas, "Applications of Toral Automorphisms Image Watermarking," Proc. of ICIP, 1996, vol. 2, pp. 237-240, 1996.
[34] C.-C. Chang, J.-C. Chuang, and P.-Y. Lin, "Sharing a secret two-tone image in two gray-level images," Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference, vol. 2, pp. 300 - 304, 2005.
[35] C.-C. Chang and T.-X. Yu, "Sharing a secret gray image in multiple images," Cyber Worlds, 2002. Proceedings. First International Symposium, pp. 230 - 237, 2002.
[36] C.-C. Chang, C.-S. Tsai, and T.-S. Chen, "A new scheme for sharing secret color images in computer network," Seventh International Conference on Parallel and Distributed Systems, pp. 21 - 27, 2000.
[37] R. Youmaran, A. Adler, and A. Miri, "An Improved Visual Cryptography Scheme for Secret Hiding," 23rd Biennial Symposium on Communications, pp. 340 - 343 2006.
[38] M. S. Fu and O. C. Au, "Joint visual cryptography and watermarking," Multimedia and Expo, 2004. ICME ''04. 2004 IEEE International Conference, vol. 2, pp. 975 - 978, 2004.
[39] Y.-C. Hou and P.-M. Chen, "An asymmetric watermarking scheme based on visual cryptography," Signal Processing Proceedings, 2000. WCCC-ICSP 2000. 5th International Conference, vol. 2, pp. 992 - 995, 2000.