[1]陳君瑋,施順鵬,“居家安全監控系統”,碩士論文,電腦與通訊系研究所,樹德科技大學,2010年。[2]莊詠程,翁文彥,“植基於OSGi之居家安全監控系統”,碩士論文,資訊工程學系碩士班,中華大學,2009年。[3]張志坤,張顧耀,“居家安全監控系統之設計與實作”,碩士論文,資訊工程學系碩士班,大葉大學,2008年。[4]劉炯毅,謝德鑫,“校園行動裝置門禁管理系統之研究”,碩士論文,資訊科技應用研究所,高苑科技大學,2010年。[5]A. K. Junoh, M. N. Mansor, S. A. Abu, W. Z. Wan Ahmad, A. Z. Mukhtar, and S. F. Fauzi, “Home Security System Based on K-NN Classifier”, Procedia Engineering, Vol. 38, 2012, pp. 1811-1815.
[6]張又文,“使用雲端運算實現生物分子演算法來解決集合包裝的最佳解問題”,碩士論文,國立高雄應用科技大學,2009年。[7]Cloud computing, “http://en.wikipedia.org/wiki/Cloud_computing”.
[8]鄭石源,“雲端運算對於電信產業的影響”,中華電信研究所寬頻網路研究室,2012年。
[9]C. Abbas, C. Joan, C. Kevin, and M. K. Paul, “Digital image steganography: Survey analysis of current methods”, Signal Processing, Vol. 90, 2010, pp. 727-752.
[10]陳文淵,卓江南,“資訊隱藏技術之研究”,勤益學報,第21卷,第一期,2003年,第117-132頁。[11]霹靂布袋戲雜誌,2002年。
[12]X. Luo, Q. Cheng and J. Tan, “A lossless data embedding scheme for medical images in application of e-diagnosis”, in Proc, 25th, Auunal Int. Conf. of the IEEE EMBS, Vol. 1, Sep. 2003, pp. 852-855.
[13]J. Tian, “Reversible Watermarking by Difference Expansion“, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, Aug. 2003, pp. 19-22.
[14]Z. C. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, 2006, pp. 354-362.
[15]C. C. Chang, C. Y. Lin, and Y. Z. Wang, “New image steganographic methods using run-length approach”, Information Sciences, Vol. 176, 2006, pp. 3393-3208.
[16]T. D. Kieu and C. C. Chang, “A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy”, Journal of Systems and Software, Vol. 82, 2009, pp. 1743-1752.
[17]T. D. Kieu and C. C. Chang, “A reversible data hiding scheme using complementary embedding strategy”, Information Sciences, Vol. 180, 2010, pp. 3045-3058.
[18]J. Lin, S. H. Shin, and K. Y. Yoo, “A reversible data hiding scheme using inverse embedding methods in double-embedding strategies”, The 7th International Conference on Informatics and Systems (INFOS), 2010, pp. 1-7.
[19]吳豐榮,“二元影像之資訊隱藏方法”, 碩士論文,朝陽科技大學,2011年。[20]劉姿攸,陳文儉,“高藏量可回復式資訊隱藏之研究”,碩士論文,資訊工程學系碩士班,大葉大學,2011年。[21]T. Jun, “Reversible data embedding using a difference expansion”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, 2003, pp. 890-896.
[22]C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based on JPEG and quantization table modification” Information Sciences, Vol. 141, 2002, pp. 123-138.
[23]李秀月,蔡玉娟,“影像壓縮技術為基礎之資訊隱藏研究”,碩士論文,資訊管理系碩士班,國立屏東科技大學,2003年。[24]C. C. Chang, C. L. Chiang, and J. Y. Hsiao, “A DCT-domain system for hiding fractal compressed images“, Proceedings of IEEE International Conference on Advanced Information Networking and Applications, 2005, pp. 1-4.
[25]C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible hiding in DCT-Based compressed images”, Information Sciences, Vol. 177, Feb. 2007, pp. 2768-2786.
[26]許智凱,陳致瑋,鄭朝榮,“實作具影像混沌加密功能之雲端相簿”,智慧生活科技研討會,2010年。
[27]李俊昇,“JPEG影像之無失真資訊隱藏法”,第九屆離島資訊技術與應用研討會論文集,2010年。
[28]R. D. Lin and C. T. Chang, “A compact covering method to exploit embedding capacity for matrix encoding”, Information Sciences, Vol. 188, 2012, pp. 170-181.
[29]黃柏翎,王文彥,鄭朝榮,“在Hadoop雲端運算平台實作混沌影像資訊隱藏技術”, TANET2012臺灣網際網路研討會,2012年。
[30]W. H. Chen, C. Smith, and S. Fralic, “A fast computational algorithm for the discrete cosine transform”, IEEE Trans. Commun, Vol. 25, Sep. 1977, pp. 1004-1009.
[31]Baidu文庫,“http://goo.gl/IdsCM”.
[32]Zxing, “http://code.google.com/p/zxing/”.
[33]QR Code, “http://en.wikipedia.org/wiki/QR_code”.
[34]洪羿漣,“初探Hadoop開放原始碼平台環境”,RUN!PC雜誌,2009年。
[35]http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html
[36]http://map-reduce.wikispaces.asu.edu/
[37]http://www.searchtb.com/2011/01/understanding-hbase.html
[38]國網中心Hadoop公用實驗叢集,“http://hadoop.nchc.org.tw/”.
[39]Hadoop Streaming, “http://goo.gl/8Y75C”.