|
1.陳同孝,張真誠,黃國峰,數位影像處理技術,松崗電腦圖書資料股份有限公司,民89年。 2.張真誠,陳同孝,黃國峰,電子影像技術,松崗電腦圖書資料股份有限公司,民92年 3.�F紹綱譯,數位影像處理,普林斯頓國際有限公司,民92年。 4.侯永昌,杜淑芬,許慶昇,“像素不擴展的視覺式秘密分享方法”,第十四屆全國資訊安全會議論文集,2004.06,第508 - 515頁。 5.Blakley, B., “Safeguarding Cryptographic Keys”, In Proceedings of the National Computer Conference, Vol. 48, 1979, pp. 313-317. 6.Chang, C. C., and Chuang, J. C., “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy”, Pattern Recognition Letters, 23, 2002, pp. 931-941. 7.Lin, C. C., and Tsai, W. H., “Visual cryptography for gray-level images by dithering techniques”, Pattern Recognition Letters, 24, 2003, pp. 349-358. 8.Lou, D. C., Tso, H. K., and Liu, J. L., “A copyright protection for digital images using Visual Cryptography technique”, Computer Standards & Interfaces, 29, 2007, pp. 125-131. 9.Hou, Y. C., “Visual Cryptography for Color Images”, Pattern Recognition, 36, 2003, pp. 1619-1629. 10.Hou, Y. C., and Tu, S. F., “A Visual Cryptographic Technique for Chromatic Images Using Multi-pixel Encoding Method”, Journal of Research and Practice in Information Technology, Vol. 37, 2005, pp. 179-191. 11.Kim, H. J., and Choi, Y., “A New Visual Cryptography Using Natural Images”, IEEE International Symposium on Circuits and System, Vol. 6, 2005, pp. 5537-5540. 12.Kim, H. J., and Choi, Y., “Visual Secret Sharing Over Natural Images”, The 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005. 13.Nakajima, M., and Yamaguchi, Y., “Extended Visual Cryptography for Natural Images”, Proceedings of the 10th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, University of West Bohemia, Czech Republic, Vol. 1.2, 2002, pp. 303-310. 14.Naor, M., and Shamir, A., “Visual Cryptography”, in Advances in Cryptology-EUROCRYPT ’94, LNCS 950, 1995, pp. 1-12. 15.Ito, R., Kuwakado, H., and Tanaka, H., “Image Size Invariant Visual Cryptography”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E82-A:10, 1999, pp. 2172-2177. 16.Hwang, R. J., and Chang, C. C., “Hiding a picture in two pictures”, Optical Engineering. Vol. 40, 2001, pp. 342-351. 17.Shamir A., “How to Share a Secret”, Communication of the ACM, Vol. 22, 1979, pp. 612-613.
|