[1] Minerva M.Yeung, Frederick C. Mintzer, Gordon W. Braudaway, and A.R. Rao, " Digital watermarking for high-quality imaging ", 23-25 June 1997 Page(s):357-362,IEEE CNF
[2] Yusnita Yusof and Othman O. Khalifa, Member, IEEE, "Digital Watermarking For Digital Images Using Wavelet Transform " 14-17 May 2007 Page(s):665-669, IEEE CNF
[3] I. Hong, I. Kim, and S.S. Han, "A blind watermarking technique using wavelet transform", Proceedings on IEEE International Symposium of Industrial Electronics, Volume: 3, 2001, pp.1946-1950
[4] J.J. Chas, B.S. Manjunath, "A Robust Embedded Data from Wavelet Coefficients", Department of Electrical and Computer Engineering,PP.1-10.
[5] M. Naor, and A. Shamir, "Visual Cryptography", Advances in Cryptology-Eurocrypt’94, Spring-Verlag, Berlin, 1995, pp.1-12.
[6] Stinson, D, "Visual cryptography and threshold schemes", Volume 18, Issue 1, Feb-Mar 1999 Page(s):13-16 , IEEE JNL
[7] Liguo Fang; Bin Yu, "Research on Pixel Expansion of (2,n) Visual Threshold Scheme", 3-5 Aug. 2006 Page(s):856-860 , IEEE CNF
[8] Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin, "Sharing a Secret Two-Tone Image in Two Gray-Level Images", Volume 2, 20-22 July 2005 Page(s):300-304 Vol. 2
[9] G. R. Blakley, "Safeguarding Cryptographic Keys, " AFIPS Conference Processing, 1979.
[10] Adi Shamir, "How to share a secret", Communications of the ACM, Volume 22 , Issue 11, Pages: 612 - 613 ,1979
[11] C.C. Thien and J.C. Lin, "Secret Image Sharing" Computers & Graphics, Vol.26, pp.765-770,2002
[12] Chien-Chang Chen and Wen-Yin Fu, "A Geometry-Based Secret Image Sharing Approach", Image and Vision Computing New Zealand, New Zealand, November, 2005
[13] 傅文殷,陳建彰"植基於多維空間的機密影像分享方法",玄奘大學,資訊管理碩士,2004[14] R. Liu, T. Tan, "An SVD-Based watermarking scheme for protecting rightful ownership "IEEE Trans. On Multimedia, vol. 4, Page(s):121-128, No. 1, March 2002.
[15] Chandra, D.V.S.: Digital Image Watermarking Using Singular Value Decomposition. In: MWSCAS 2002. Proceedings of 45th Midwest Symposium on Circuits and Systems,August 4-7, 2002, vol. 3, pp. 264-267 (2002)
[16] Rui Sun, Hong Sun and Tianren Yao , "A SVD-and Quantization Based Semi-fragile Watermarking Technique for Image Authentication" ,IEEE CNF, Signal Processing, 2002 6th International Conference on Volume 2, 26-30 Aug. 2002 Page(s):1592-1595 vol.2
[17] Gary Brimley Utah State University, "Robust and Fragile Image Adaptive Watermarking Using DWT and SVD", August 8, 2006
[18] Chin-Chen Chang , Yih-Shin Hu , and Chia-Chen Lin , "A Digital Watermarking Scheme Based on Singular Value Decomposition", ESCAPE 2007: 82-93
[19] Xinzhong Zhu, Jianmin Zhao and Huiying Xu, "A Digital Watermarking Algorithm and Implementation Based on Improved SVD", Volume: 3, On page(s): 651-656,IEEE CNF,2006
[20] Liu Liang; Sun Qi, "A new SVD-DWT composite watermarking", IEEE CNF , Volume 4,16-20 2006
[21] Chin-Chen Chang, Ju-Yuan Hsiao and Chi-Lung Chiang, "An Image Copyright Protection Scheme Based on Torus Automorphism", 6-8 Nov. 2002 Page(s):217-224, IEEE CNF
[22] Tung-Shou Chen、Jian-Guo Chen, " A simple and efficient watermark technique based on JPEG2000 Codec", Volume 10, Number 1, June 2004