1 |
Sara Tedmori, Nijad Al-Najdawi, "Image Cryptographic Algorithm Based on the Haar Wavelet Transform," Information Sciences, Vol. 269, 2014, pp. 21-34.
DOI
|
2 |
Y. Chen "Cheating Prevention in Visual Cryptography," IEEE Trans. Image Process., Vol 21, No 7, 2012, pp. 3319-3323.
DOI
|
3 |
Daubechies, I., W. Sweldens, Factoring Wavelet transforms into lifting steps, Asilomar Conference on Signals, Systems, and Computers, 1997.
|
4 |
Shin Jonghong, "Digital Image Processing Using Tunable Q-factor Discrete Wavelet Transformation", Jonghong Shin, The Korea Society of Digital Industry & Information Management, Vol. 10, No. 3, Sep. 2014, pp. 237-247
DOI
|
5 |
P. P. Vaidynathan, Multirate digital filters, filter banks, polyphase network and applications: A Tutorial, Proceedings of the IEEE. Vol. 78, No. 1, 1990
|
6 |
Park Byeonghoon, Lim Joonghee, Shin Jonghong, "Imaged Cryptographic Algorithm Based on the Lifting Wavelet Transform", 2015 The Korea Society of Digital Industry & Information Management Falling Proceeding, 21th Nov. 2015, pp. 47-51
|