[1]呂慈純、陸哲明、張真誠。多媒體安全技術。全華圖書股份有限公司,台北,民國九十六年。
[2]呂慈純、陳培倫、廖湘如,「植基於灰階影像區塊分割之隱藏技術」,資訊安全通訊,第三卷第十五期,103 ~ 115頁,民國九十八年。[3]巫家源,「以特徵位置關係隱藏關鍵資訊並抵抗社交網站之破壞性壓縮的方法」,清雲科技大學電腦通訊與系統工程研究所,碩士論文,民國一百零一年。[4]林凱均,「適用於彩色影像的容忍失真壓縮資訊隱藏技術之研究」,淡江大學資訊工程學系,碩士論文,民國九十四年。
[5]葉秀蓮,「植基於預測編碼之可回復式資訊隱藏技術」,靜宜大學資訊管理系,碩士論文,民國九十六年。[6]劉江龍、李建中,「植基於預測編碼誤差之無失真影像藏密技術」,中正嶺學報,第三十八卷第一期,71~84頁,民國九十八年。[7]A. M. Alattar,“ Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, Aug. 2004.
[8]Bender, W. , Gruhl, D. , Morimoto, N. and Lu, A. , “Techniques for Data Hiding,” IBM System Journal, Vol. 35, No. 3&4, pp. 313-336, 1996.
[9]C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, No. 3, pp.469-474, 2004.
[10]C. C. Thien and J. C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit in Images Based on Modulus Function, ”Pattern Recognition, Vol.36, No.3, pp.2875-2881, 2003.
[11]C. H. Tzeng, Z. F. Yang and W. H. Tsai, “Adaptive Data Hiding in Palette Image by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, No. 5, pp. 791-800, 2004.
[12]C. C. Chang and H. W. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, Vol. 25, No.12, pp.1431-1437, 2004.
[13]D. Kohn(1996), The Code breakers : The Story of Secret Writing. New York : Scribner.
[14]Duke, D., “Image Is Everything,” Network Security, Vol. 2002, No. 4, pp. 4-5, Apr. 2002.
[15]D. C. Wu and W. H. Tsai, “Image Hiding in Spatial Domain Using an Image Differencing Approach,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 147, No. 1, pp.29-37, 2000.
[16]D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, No.9-10, pp. 1613-1626, 2003.
[17]H. K. Pan, Y. Y. Chen and Y. C. Tseng, “A Secure Data Hiding Scheme for Two-Color Images,” Proceedings of the IEEE Fifth Symposium on Computers and Communications (ISCC2000), pp. 750-755, 2000.
[18]ISO/IEC 15544-1, Information Technology – JPEG2000 Image Coding System – Part1: Core Coding System, 2000.
[19]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.
[20]Jung, K. H. and Yoo, K.Y., “Data HidingMethod Using Image Interpolation,” ComputerStandards & Interfaces, Vol. 31, No. 2, pp.465-470, 2009.
[21]M. Jo and H. Kim, “A Digital Image Watermarking Scheme Based on Vector Quantization,” IEICE Transactions on Information and System, E85-D, pp. 1054-1056, 2002.
[22]Petitcolas, F.A.P., Anderson, R. J., and Kuhn, M. G., “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, Jul. 1999.
[23]P. Y. Tsai, Y. C. Hu and C. C. Chang, “An Image Hiding Technique Using Block Truncation Coding,” Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, pp. 54-64, 2002.
[24]S. D. Lin and C. F. Chen, “A Rocust DCT-Based Watermarking for Copyright Propection, ”IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, 2000.
[25]W. Stallings(1999), Cryptography and Network Security. New Jersey : Prentice Hall.
[26]Y. Linde, A. Buzo, and R. M. Gray, “An Algorithm for Vector Quantizer Design,” IEEE Transactions on Communications, Vol. 28, No.1, pp. 84-95, 1980.
[27]Z. M. Lu and S. H. Sun, “Digital Image Watermarking Technique Based on Vector Quantisation,” Electronic Letters, Vol. 36, No. 4, pp. 303-305, 2000.
[28]Z. Yang, C. Patrizio, and K. Deepa, “Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,” IEEE Transactions on Image Processing, Vol. 13, No. 3, pp. 430-448, 2004.
[29]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No.3, pp. 354-362, 2006.