|
[1]徐宏昇,網路智慧財產權完整解析,寶鼎出版社,2005。 [2]蔡雅惠,蔡文祥,“用於網頁版權保護的資訊隱藏方法,”NCS全國計算機會議,2003。 [3]購物網站有分身?疑是詐騙新手法,http://www.epochtimes.com/b5/8/6/19/n2160773.htm,2008。 [4]林祝興,張明信,資訊安全導論,旗標出版社,2009。 [5]J. Ashcroft, “Electronic Crime Scene Investigation: A Guide for First Responders,” U.S Department of Justice, Office of Justice Programs, National Institute of Justice, 2001. [6]J. Ashcroft, D.J. Daniels, and S.V. Hart, “Forensic Examination of Digital Evidence: A Guide for Law Enforcement,” U.S Department of Justice, Office of Justice Programs, National Institute of Justice, 2004. [7]E. Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet,” Academic Press, 2000. [8]A. Castiglione, A. D. Santis, and C. Soriente, “Taking Advantages of a Disadvantage: Digital Forensics and Steganography Using Document Metadata,” Journal of Systems and Software, Vol. 80, No. 5, pp.750–764, 2007. [9]Y. T. Chen, C. H. Yang, and S. J. Wang, “Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems,” The 5th International Conference on Future Information Technology, Korea, pp. 1–6, 2010. [10]C. C. Chang and I. C. Lin, “A new (t, n) threshold image hiding scheme for sharing a secret color image,” Proceedings of International Conference on Communication Technology, pp. 196–202, 2003. [11]J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, “A new multi-secret images sharing scheme using Largrange’s interpolation,” The Journal of Systems and Software Vol. 76, No. 3, pp.327–339, 2005. [12]S. L. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, “Bringing Science to Digital Forensics with Standardized Forensic Corpora,” Digital Investigation, Vol. 6, No 1. , pp.2–11, 2009. [13]S. L. Garfinkel, “Digital Forensics Research: The next 10 years,” Digital Investigation, Vol. 7, No. 1, pp.64–73, 2010. [14]G. Horng, T. H. Chen, and D. S. Tsai, “Cheating in Visual Cryptography,” Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219–236, 2006. [15]W. G. Kruse and J. G. Heiser, “Computer Forensics: Incident Response Essentials,” Addison-wesley, 2002. [16]C. C. Lin and W. H. Tsai, “Secret Image Sharing with Steganography Authentication,” The Journal of Systems and Software, Vol. 73, No. 3, pp. 405–414, 2004. [17]C. C. Lin and W. H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognition Letters, Vol. 24, No. 1–3, pp.349–358, 2003. [18]S. Lee, A. Savoldi, K. S. Lim, J. H. Park, and S. Lee, “A Proposal for Automating Investigations in Live Forensics,” Computer Standards & Interfaces, Vol. 32, No.5-6, pp.246–255, 2010. [19]M. Naor and A. Shamir, “Visual Cryptography,” in Proceedings of Eruocrypt’94, Lecture Notes in Computer Science, Springer-Verlag, pp. 1–12, 1994. [20]S. Perumal, “Digital Forensic Model Based on Malaysian Investigation Process,” International Journal of Computer Science and Network Security, Vol. 9, No. 8, pp.38–44, 2009. [21]P. Sommer, “Forensic Science Standards in Fast-changing Environments,” Science &Justice, Vol. 50, No. 1, pp.12–17, 2010. [22]A. Shamir, “How to Share a Secret,” Communications of the Association for Computing Machinery, Vol. 22, No. 11, pp. 612–613, 1979. [23]C. C. Thien and J. C. Lin, “Secret Image Sharing,” Computers and Graphics, Vol. 26, No. 5, pp. 765–770, 2002. [24]C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp.1161–1169, 2003. [25]J. R. Vacca, “Computer Forensics: Computer Crime Scene Investigation, Charles River Media,” Charles River Media, 2002. [26]S. J. Wang, I. S. Lin, L. C. Lin, and W. Y. Chiang, “Secret Sharing Systems with Authentication-based Steganography,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing, No. 15-17, pp. 1146–1149, 2008. [27]H. B. Wolfe, “Computer Forensics,” Computers and Security, Vol. 22, No. 2, pp. 26-28, 2003. [28]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, No. 3, pp. 671–683, 2001. [29]C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems and software, Vol. 80, No. 7, pp. 1070–1076, 2007. [30]C. H. Yang, “Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution,” Pattern Recognition, Vol. 41, No. 8, pp.2674–2683, 2008. [31]C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Cheating-Immune Secret Image Sharing Scheme with Steganography,” in Proceedings of the 16th National Conference on Information Security, R.O.C., Taiwan, 2006. [32]R. Zax and F. Adelstein, “ FAUST: Forensic Artifacts of Uninstalled Steganography Tools,” Digital Investigation, Vol. 6, No. 1–2, pp. 25-38, 2009.
|