參考文獻
1.李美惠、MD研究會、DTPWORLD編集部,《圖解色彩管理的實踐》,博碩文化,2005。
2.侯永昌、林芳助、張兆源,「一種256色機密影像分享的新技術」,《資管評論》,第九期,1999。3.陳同孝、黃國峰、張真誠,《電子影像技術》,旗標,2003。
4.繆紹網,《數位影像處理》,普林斯頓,2005。
5.A. Gersho and R.M. Gray, ”Vector Quantization and Signal Compression”, Kluwer Academic Publishers, MA.1993.
6.A. Kumar and N. Rajpal, “Secret image sharing using pseudo-random sequence”, IJCSNS international Journal of Computer Science and Network Security, vol. 6, No.2B, Feb. 2006, P.185-193.
7.C. Yang and C. Laih, “New colored visual secret sharing schemes.”, Designs, Codes and Cryptography, vol.20, 2000, P.325-335.
8.C. Kwong Chan and L.M. Cheng, “Hiding data in image by simple LSB substitution”, Pattern Recognition 37, 2004, P.469-474.
9.C.C. Thien and J.C. Lin ,“An image-sharing method with user-friendly shadow images”Circuits and Systems for Video Technology, IEEE Transactions ,Volume 13 ,Issue 12 ,Dec 2003,P.1161 – 1169.
10.C.C. Chang and H.W. Tseng, “A stegonographic method for digital images using side match”, Pattern Recognition Letters 25, 2004, P.1431-1437.
11.C.C. Chang and T.X. Yu “Sharing a secret gray image in multiple images”,Cyber Worlds, 2002. Proceedings. First International Symposium ,6-8 Nov. 2002,P.230 – 237.
12.C.C. Chang, C.S. Tsai and T.S. Chen, “A new scheme for sharing secret color images in computer network”, Parallel and Distributed Systems, 2000. Proceedings. Seventh International Conference, 4-7 July 2000, P.21 – 27.
13.C.N. Yang and T.S. Chen, “Size-adjustable visual secret sharing schemes”, IEICE TRANS. Fundamentals, vol.E88-A, No.9, Sep. 2005, P.2471-2474.
14.C.P. Huang and C.C. Li, “A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform”,Pattern Recognition, 2006. ICPR 2006. 18th International Conference,Volume 3, 20-24 Aug. 2006, P.802 – 805.
15.E. Myodo, and K. Tanaka, “A watermark sharing scheme to halftone images with genetic algorithms” Signal Processing and Information Technology, 2003. ISSPIT 2003. Proceedings of the 3rd IEEE International Symposium ,14-17 Dec. 2003 ,P.194 – 198.
16.E.R. Verheul and H.C.A. van Tilborg, “Constructions and properties of k out of n visual secret sharing schemes”, Designs, Codes and Cryptography, Volume 11 , Issue 2, 1997, P.179-196.
17.J.K. O’Ruanaidh, W.J. Dowling and F.M. Boland, “Phase watermarking of digital images”, Proceedings of IEEE International Conference on Image Processing ,vol.3,1996.P239-242.
18.M. Naor and A. Shamir, ”Visual Cryptography”, Eurocrypt’94 Lecture Notes in Computer Science, Springer-Verlag,Perugia, Italy, 1994, P.1-12.
19.M. Naor, and A. Shamir,”Visual Cryptography II: Improving the Contrast Via the Cover Base”, Theory of Cryptography Library Report 96-07.
20.M.S. Liaw and L.H Chen, “An Effective Data Hiding Method”, Proceeding of the Sixth National Conference on Science and Technology of National , Vol.2, Taoyuan , Taiwan, Nov.1997, P.534-540.
21.N. Memon and P.W. Wong, “Protecting Digital Media Content”, Communications of the ACM(41:7), July 1998, P.35-43.
22.S. Mallat, “A Compact Multiresolution Representation: The Wavelet Model.”, Proc.IEEE Computer Society Workshop on Computer Vision, IEEE Computer Society Press, Washington, D.C., P.2-7.
23.V. Rijmen and B. Preneel, “Efficient colour visual encryption or shared colors of Benetton”, presented at EUROCRYPT 96 Rump Session,1996.
24.R.G. Van Schyndel, A.Z. Tirkel, and C.F. Osborne,”A Digital Watermark”, IEEE Int. Conf. Image Processing, 1994, P.86-90.
25.W.G. Tzeng and C.M. Hu, “A new approach for visual cryptography”, Designs,Codes and Cryptography 27(3), 2002, P.207-227.
26.Y.K. Lee and L.H.Chen, “An Adaptive Image Steganographic Model Based on Minimum-Error LSB Replacement”, Proceedings of Ninth National Conference on Information Security, Taichung, Taiwan, May 1999, P8-15.