|
[1]陳盈瑜、黃金本、王任瓚,"具自然分存圖像的機密圖像分享方法",桃園縣銘傳大學, Jel. 2009. [2]左豪官、婁德權,2011網路與資訊安全研討會,C2,41 ~ 47頁,「灰階視覺密碼技術」,民國一○○年十二月。 [3]吳匡時,羅聰明,林員福,張劍平, 2012工程與電資科技應用發展論文發表學術研討會, pp. 46-49, "彩色影像分享",桃園縣萬能科技大學, Dec. 21, 2012。 [4]吳匡時,羅聰明,邱益賢,林員福,張劍平,2012工程與電資科技應用發展論文發表學術研討會, pp. 18-21, "視覺密碼在彩色影像上之應用", 桃園縣萬能科技大學, Dec. 21, 2012,。 [5]吳匡時、羅聰明、林員福、吳貝庭,第六屆電資科技應用與發展學術研討會論文集, pp. 83-87, "一個新的視覺密碼設計",桃園縣萬能科技大學, Dec. 16, 2011。 [6]Android issues reviewed. Code.google.com. [2011-08-08]. [7]Android Open Source Project Frequently Asked Questions: Compatibility. source.android.com. [13 March 2011]. [8]"Android SDK Glossary"(http://developer.android.com/guide/appendix/ glossary.html). [9]Bort, Dave. Android is now available as open source. Android Open Source Project. 21 October 2008 [2009-09-03]. [10]Boulton, Clint. Google Open-Sources Android on Eve of G1 Launch. eWeek. 21 October 2008 [2009-09-03]. [11]C. C. Thien and J. C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, Vol. 36, pp. 2875-2881, 2003. [12]C.N. Yang, T.S. Chen, Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion, Pattern Recognition 26 (2)(2005) 193–206. [13]G.R. Blakley,"Safeguarding cryptographic keys," Proceedings of the AFIPS 1979 National Camputer Conference, Vol. 48, pp. 313-317, 1979. [14]Google Keynote at AnDevCon II. Development Team. 09 November 2011. [15]"IntelliJ Android Development". Retrieved 19 September 2012. [16]JDK將包含閉源特性(http://developer.51cto.com/art/201011/233367.htm). [17]Kafri and E. Keren, (1987), “Encryption of Pictures and Shapes by Random Grids,”,pp. 377-379,Optics Letters, Vol. 12, No. 6. [18]Licenses: Android Open Source. Android Open Source Project. [25 October 2011]. [19]"NBAndroid Plugin". Retrieved 19 September 2012. [20]R. Lukac and K. N. Plataniotis, "Bit-level based secret sharing for image encryption," Pattern Recognition, Vol. 38, pp. 767-772, 2005. [21]Ryan Paul. Why Google chose the Apache Software License over GPLv2 for Android. Ars Technica. 2008 [25 October 2011]. [22]S. J. Shyu, (2007),"Image Encryption by Random Grids,",pp. 1014-1031 Pattern Recognition, Vol. 40, No. 3. [23]SDK Tools"(http://developer.android.com/tools/sdk/tools-notes.html). [24]Shamir,"How to share a secret,"Communication of the ACM, Vol. 22, No. 11, pp. 612-613, 1979. [25]"Tools Overview". Android Developers. 21 July 2009. [26]Verheul E. R. and van Tilborg H. C. A., “Constructions and properties of k out of n visual secret sharing schemes”, Designs, Codes and Cryptography (11:2), 1997: pp. 179-196. [27]Westfall, Jon (25 August 2009). "Backup & Restore Android Apps Using ADB". JonWestfall.com. Retrieved 2009-12-07. [28]Yang, C. N. and Laih, C. S., “New Colored Visual Secret Sharing Schemes”, Designs, Codes and Cryptography (20), 2000: pp. 325-335.
|