|
[1]Fourier Jean-Baptiste-Joseph. 1822. Théorie Analytique De La Chaleur. Paris: F. Didot. [2]P. K. Muhuri, Z. Ashraf, and S. Goel, “A Novel Image Steganographic Method Based on Integer Wavelet Transformation and Particle Swarm Optimization,” Applied Soft Computing, vol. 92, p. 106257, Jul. 2020, doi: 10.1016/j.asoc.2020.106257. [3]弗雷利, Frary, M., & 張毅瑄. (2021). 密碼的故事 : 人類史上最重要的45種密碼與破解之道 (初版). 遠足文化. [4]C.-K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, Mar. 2004, doi: 10.1016/j.patcog.2003.08.007. [5]W. Hong and T.-S. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Trans.Inform.Forensic Secur., vol. 7, no. 1, pp. 176–184, Feb. 2012, doi: 10.1109/TIFS.2011.2155062. [6]Y. Ge, Q. Zhang, Y. Sun, Y. Shen, and X. Wang, “Grayscale Medical Image Segmentation Method Based on 2D&3D Object Detection with Deep Learning,” BMC Med. Imaging, vol. 22, no. 1, p. 33, Dec. 2022, doi: 10.1186/s12880-022-00760-2. [7]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Trans. on Image Process, vol. 13, no. 4, pp. 600–612, Apr. 2004, doi: 10.1109/TIP.2003.819861. [8]J.-Y. Zhu, T. Park, P. Isola, and A. A. Efros, “Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks.” arXiv, Aug. 24, 2020. Accessed: Dec. 29, 2023. [Online]. Available: http://arxiv.org/abs/1703.10593 [9]D. Ha and D. Eck, “A Neural Representation of Sketch Drawings.” arXiv, May 19, 2017. Accessed: Jul. 02, 2024. [Online]. Available: http://arxiv.org/abs/1704.03477 [10]S. K. Verma, M. Kaur, and R. Kumar, “Hybrid Image Fusion Algorithm Using Laplacian Pyramid and PCA Method,” in Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur India: ACM, Mar. 2016, pp. 1–6. doi: 10.1145/2905055.2905275. [11]A. Makandar and B. Halalli, “Image Enhancement Techniques Using Highpass and Lowpass Filters,” IJCA, vol. 109, no. 14, pp. 21–27, Jan. 2015, doi: 10.5120/19256-0999. [12]U. G. Gangkofner, P. S. Pradhan, and D. W. Holcomb, “Optimizing the High-Pass Filter Addition Technique for Image Fusion,” PHOTOGRAMMETRIC ENGINEERING. [13]C. Yu, “Attention Based Data Hiding with Generative Adversarial Networks,” AAAI, vol. 34, no. 01, pp. 1120–1128, Apr. 2020, doi: 10.1609/aaai.v34i01.5463. [14]Y. Luo, J. Qin, X. Xiang, Y. Tan, Q. Liu, and L. Xiang, “Coverless Real-Time Image Information Hiding Based on Image Block Matching and Dense Convolutional Network,” J Real-Time Image Proc., vol. 17, no. 1, pp. 125–135, Feb. 2020, doi: 10.1007/s11554-019-00917-3. [15]J. Canny, “A Computational Approach to Edge Detection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-8, no. 6, pp. 679–698, Nov. 1986, doi: 10.1109/TPAMI.1986.4767851.
|