參考文獻 |
[1] Acklam, P. J., (2004). “An algorithm for computing the inverse normal cumulative distribution function.” Available: http://home.online.no/~pjacklam/notes/invnorm/
[2] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., (1996a). “Constructions and bounds for visual cryptography,” Proceedings of the 23rd International Colloquium on Automata, Languages and Programming (ICALP 1996), Lecture Notes in Computer Science 1099, pp. 416-428.
[3] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., (1996b). “Visual cryptography for general access structures,” Information and Computation, Vol. 129, No. 2, pp. 86-106.
[4] Atici, M., Magliveras, S. S., Stinson, D. R., and Wei, W. D., (1996). “Some recursive constructions for perfect hash families,” Journal of Combinatorial Designs, Vol. 4, No. 5, pp. 353-363.
[5] Bayer, B. E., (1973). “An optimum method for two level rendition of continuous-tone pictures,” Proceedings of IEEE International Conference on Communications, New York, pp. (26-11)-(26-15).
[6] Berenson, M. L. and Levine, D. M., (1999). Basic Business Statistics: Concepts and Applications. Prentice-Hall, New Jersey, pp. 337-353.
[7] Bialas, W. F., (Summer 2004). Lecture Notes in Applied Probability. Department of Industrial Engineering, the State University of New York at Buffalo.
[8] Blundo, C. and De Santis, A., (1998). “Visual cryptography schemes with perfect reconstruction of black pixels,” Computer & Graphics, Vol. 12, No. 4, pp. 449-455.
[9] Blundo, C., D'Arco, P., De Santis, A., and Stinson, D. R., (2003). “Contrast optimal threshold visual cryptography schemes,” SIAM Journal on Discrete Mathematics, Vol. 16, No. 2, pp. 224-261.
[10] Blundo, C., De Bonis, A., and De Santis, A., (2001). “Improved schemes for visual cryptography,” Designs, Codes and Cryptography, Vol. 24, No. 3, pp. 255-278.
[11] Blundo, C., De Santis, A., and Naor, M., (2000). “Visual cryptography for grey level images,” Information Processing Letters, Vol. 75, No. 6, pp. 255-259.
[12] Blundo, C., De Santis, A., and Stinson, D. R., (1999). “On the contrast in visual cryptography schemes,” Journal of Cryptology, Vol. 12, No. 4, pp. 261-289.
[13] Braudaway, G. W., Magerlein, K. A., and Mintzer, F., (1996). “Protecting publicly-available images with a visible image watermark,” Proceeding of SPIE: Optical Security and Counterfeit Deterrence Techniques, Vol. 2659, pp. 126-133.
[14] Chang, C. C., Chuang, J. C., (2002). “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognition Letters, Vol. 23, pp. 931-941.
[15] Chang, C. C., Hsiao, J. Y., and Yeh, J. C., (2002). “A colour image copyright protection scheme based on visual cryptography and discrete cosine transform,” The Imaging Science Journal, Vol. 50, pp. 133-140.
[16] Chang, H. K. C., Hou, Y. C., and Wu, J. C., (July 2001). “A multi-server identification scheme based on visual cryptography,” Proceedings of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, Vol. XIII, pp 432-436.
[17] Chen, C. T. and Lu, T. C., (March 2004). “A mobile ticket validation by VSS tech with time-stamp,” Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004), Taipei, Taiwan, pp. 267-270.
[18] Chen, P. M., (August 2000). “A visible watermarking mechanism using a statistic approach,” Proceedings of the International Conference on Signal Processing (ICSP 2000), Beijing, China, Vol. 2, pp. 901-913.
[19] Chiang, S. C. and Yue, T. W., (November 2000). “Neural networks for visual cryptography – with examples for complex access schemes,” Proceedings of the ISCA 13th International Conference on Computer Applications in Industry and Engineering, pp. 281-286.
[20] Colbourn, C. J. and Dinitz, J. H., (1996). CRC Handbook of Combinatorial Designs, CRC Press.
[21] Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T., (1997). “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, Vol. 6, No. 12, pp. 1673-1687.
[22] Eisen, P. A. and Stinson, D. R., (2002). “Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels,” Designs, Codes and Cryptography, Vol. 25, No. 1, pp. 15-61.
[23] Floyd, R. W. and Steinberg, L., (1976). “An adaptive algorithm for spatial grey scale,” Proceedings of the Society of Information Display, Vol. 17, No. 2, pp. 75-77.
[24] Fredman, M. L. and Komlós, J., (1984). “On the size of separating system and families of perfect hash functions,” SIAM Journal on Algebraic and Discrete Methods, Vol. 5, No. 1, pp. 61-68.
[25] Gonzalez, R. C. and Woods, R. E., (2002). Digital Image Processing, 2nd Edition, Prentice-Hall, Inc., Upper Saddle River, New Jersey.
[26] Hou, Y. C. and Chen, P. M., (August 2000). “An asymmetric watermarking scheme based on visual cryptography.” Proceedings of the International Conference on Signal Processing (ICSP 2000), Beijing, China, Vol. 2, pp. 992-995.
[27] Hou, Y. C., (2003). “Visual cryptography for color images,” Pattern Recognition, Vol. 36, pp. 1619-1629.
[28] Hou, Y. C., (July 2002). “Copyright protection based on visual cryptography,” Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2002), Orlando, Florida, Vol. XIII, pp. 104-109.
[29] Hou, Y. C., Chang, C. Y., and Hsu, C. S., (June 2001a). “Visual cryptography for color images without pixel expansion,” Proceedings of the International Conference on Imaging Science, Systems, and Technology (CISST 2001), Las Vegas, Nevada, USA, Vol. 1, pp. 239-245.
[30] Hou, Y. C., Chang, C. Y., and Tu, S. F., (July 2001b), “Visual cryptography for color images based on halftone technology,” Proceedings of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, Vol. XIII, pp. 441-445.
[31] Hou, Y. C., Lin, F., and Chang, C. Y., (2001c). “Visual cryptography for color images without pixel expansion,” Journal of Technology, Vol. 16, No. 4, pp. 595-603.
[32] Hsu, C. S. and Hou, Y. C., (December 2004). “A visual cryptography and statistics based method for ownership identification of digital images,” Proceedings of the International Conference on Signal Processing (ICSP’2004), Istanbul, Turkey, pp. 221-224.
[33] Hsu, C. T. and Wu, J. L., (1999). “Hidden digital watermarks in image,” IEEE Trans. Image Processing, Vol. 8, pp. 58-68.
[34] Hwang, R. J., (2000). “A digital image copyright protection scheme based on visual cryptography,” Tamkang Journal of Science and Engineering, Vol. 3, No. 2, pp. 97-106.
[35] Ignizio, J. P., (1982). Linear Programming in Single & Multiple-Objective Systems, Prentice-Hall, Inc., Englewood Cliffs, N.J., pp. 372-429.
[36] Ito, R., Kuwakado, H., and Tanaka, H., (1999). “Image size invariant visual cryptography,” IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 10, pp. 2172-2177.
[37] Iwamoto, M. and Yamamoto, H., (2002). “The optimal n-out-of-n visual secret sharing scheme for gray-level images,” IEICE Trans. Fundamentals, Vol. E85-A, No. 10, pp. 2238-2247.
[38] Jarvis, J. F., Judice, C. N., and Ninke, W. H., (1976). “A survey of techniques for the display of continuous-tone pictures on bilevel display,” Computer Graphics and Image Processing, Vol. 5, pp. 13-40.
[39] Jones, P. R., (1994). “Evolution of halftoning technology in the United States patent literature,” Journal of Electronic Imaging, Vol. 3, pp. 257-275.
[40] Kang, H. R., (1996). Color Technology for Electronic Imaging Devices, SPIE Press, Bellingham, Washington.
[41] Kang, H. R., (1999). Digital Halftoning, IEEE Press, Bellingham, Washington, Chapter 1, pp. 1-11.
[42] Katzenbeisser, S. and Petitcolas, F. A. P., (2000). Information Hiding Techniques for Steganography and Digital Watermarking, Artech house, Norwood, MA, pp. 101-109.
[43] Kim, W. S., Hyung, O. H., and Park, R. H., (1999). “Wavelet based watermarking method for digital images using the human visual system,” Electronics Letters, Vol. 35, pp. 466-468.
[44] Koch, E., Rindfrey, J., and Zhao, J., (December 1994). “Copyright protection for multimedia data,” Proceedings of International Conference on Digital Media and Electronic Publishing, Leeds, UK, pp. 6-8.
[45] Koga, H. and Yamamoto, H., (1998). “Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images,” IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 6, pp. 1262-1269.
[46] Koga, H., Iwamoto, M., and Yamamoto, H., (2001). “An analytic construction of the visual secret sharing scheme for color images,” IEICE Trans. Fundamentals, Vol. E84-A, No. 1, pp. 262-272.
[47] Low S., and Maxemchuk, N., (1998). “Performance comparison of two text marking methods,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, pp. 561-572.
[48] Matsui, K., Ohnishi, J., and Nakamura, Y., (1996). “Embedding a signature to pictures under wavelet transform,” IEICE Transactions, Vol. J79-D-II, No. 6, pp. 1017-1024.
[49] Mehlhorn, K., (1982). “On the program size of perfect and universal hash functions,” Proceedings of 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 170-175.
[50] Mese, M. and Vaidyanathan, P. P., (2002). “Recent advances in digital halftoning and inverse halftoning methods,” IEEE Trans. Circuits and Systems: Fundamental Theory and Applications, Vol. 49, No. 6, pp. 790-805.
[51] Naor, M. and Pinkas, B., (1997). “Visual authentication and identification,” Advances in Cryptology-CRYPT'97, Lecture Notes in Computer Science 1294, Springer-Verlag, pp. 322-336.
[52] Naor, M. and Shamir, A., (1995). “Visual cryptography,” Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science 950, Springer-Verlag, pp. 1-12.
[53] Neil, F. J. and Sushil, J., (1998). “Exploring steganography: Seeing the unseen,” IEEE computer, Vol. 31, No. 2, pp. 26-34.
[54] Nikolaidis, N. and Pitas, I., (May 1996). “Copyright protection of images using robust digital signatures,” Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4, pp. 2168-2171.
[55] Ohbuchi, R., Masuda, H., and Aono, M., (1998). “Watermarking three-dimensional polygonal models through geometric and topological modifications.” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, pp. 551-560.
[56] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., (April 1998). “Attacks on copyright marking systems,” Proceedings of the 2nd Workshop on Information Hiding, Portland, Oregon, USA. Vol. 1525, pp. 218-238.
[57] Roetling, P. G. and Loce, R. P., (1993). “Digital halftoning,” Image Processing: Fundamentals and Applications, Ed. E. Dougherty, Marcel Dekker, New York.
[58] Shannon, C. E., (1949). “Communication theory of secrecy systems,” Bell Systems Technical Journal, Vol. 28, No. 4, pp. 656-715.
[59] Simmons, G. J., Jackson, W., and Martin, K., (1991). “The geometry of shared secret schemes,” Bulletin of the Institute of Combinatorics and its Applications, Vol. 1, pp. 71-88.
[60] Stinson, D. R., (2002). Cryptography: Theory and Practice, 2nd Ed., Chapman & Hall/CRC, New York, pp. 48-54.
[61] Stoffel, J. C. and Moreland, J. F., (1981). “A survey of electronic techniques for pictorial reproduction,” IEEE Trans. Communication, Vol. 29, pp. 1898-1925.
[62] Stucki, P., (1981). “MECCA – a multi-error correcting computation algorithm for bilevel image hardcopy reproduction,” Research Report RZ1060, IBM Research Lab., Zurich, Switzerland.
[63] Sun, Q. B., Feng, P. R., and Deng, R., (April 2001). “An optical watermarking solution for authenticating printed documents,” Proceedings of International Conference on Information Technology: Coding and Computing (ITCC 2001), Las Vegas, NV, pp. 65-70.
[64] Ulichney, R. A., (1987). Digital Halftoning, MIT Press, Cambridge, MA.
[65] Ulichney, R. A., (1999). “Review of halftoning techniques,” Proceedings of SPIE: Color Imaging: Device-Independent Color, Color Hardcopy, and Graphic Arts V, Vol. 3963, pp. 378-391.
[66] Verheul, E. R., and van Tilborg, H. C. A., (1997). “Constructions and properties of k out of n visual secret sharing schemes,” Designs, Codes and Cryptography, Vol. 11, No. 2, pp. 179-196.
[67] Yang, C. N. and Chen, T. S., (June 2004). “Image size invariant visual secret sharing schemes for gray level image,” Proceedings of the 14th Information Security Conference, Taipei, Taiwan, pp. 464-471.
[68] Yang, C. N. and Laih, C. S., (2000). “New colored visual secret sharing schemes,” Designs, codes and cryptography, Vol. 20, No. 3, pp. 325-335.
[69] Yang, C. N., (2004). “New visual secret sharing using probabilistic method,” Pattern Recognition Letters, Vol. 25, No. 4, pp. 481-494.
[70] Yang, K. H., (2002). “A study of electronic cash schemes against embezzling,” Thesis (Master), Department of Computer Science and Information Engineering, Tung-Hat University, Taiwan, R.O.C.
[71] Yeh, T. C., (2002). “Visual signature checking by using pattern dithered method,” Thesis (Master), Department of Information Engineering, I-Shou University, Taiwan, R.O.C.
[72] Yi, S. Y., Chung, K. L., Ryu, C. S., Cha, K. H., Lee, S. H., and Kim, E. S., (1999). “Encryption of cell-oriented computer generated hologram by using visual cryptography,” Proceedings of the Pacific Rim Conference on Lasers and Electro-Optics (CLEO/Pacific Rim 2001), Seoul, South Korea, Vol. 3, pp. 817-818.
[73] Yue, T. W. and Chiang, S. C., (2004). “A neural-network approach for visual cryptography and authorization,” International Journal of Neural Systems, Vol. 14, No. 3, pp. 175-197.
[74] Yue, T. W. and Chiang, S. C., (December 2003). “A neural-network approach for visual cryptography and authorization,” Proceedings of Design and Application of Hybridization of Intelligent Systems (HIS 2003), Melbourne, Australia, pp. 993-1002.
[75] Yue, T. W. and Chiang, S. C., (July 2000). “A neural network approach for visual cryptography,” Proceedings of the International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, Vol. 5, pp. 494-499.
[76] Yue, T. W. and Chiang, S. C., (July 2001a). “A known-energy neural network approach for visual cryptography,” Proceedings of the International Joint Conference on Neural Networks (IJCNN 2001), Washington, DC, Vol. 4, pp. 2542-2547.
[77] Yue, T. W. and Chiang, S. C., (June 2001b). “The general neural-network paradigm for visual cryptography,” Proceedings of the 6th International Work-Conference on Artificial and Natural Neural Networks (IWANN 2001), Lecture Notes in Computer Science 2084, Springer-Verlag, Granada, Spain, pp. 196-206. |