1 |
Daubechies, I., W. Sweldens, "Factoring Wavelet transforms into lifting steps," Asilomar Conference on Signals, Systems, and Computers, 1997.
|
2 |
Sara Tedmori, Nijad Al-Najdawi , "Image Cryptographic Algorithm Based on the Haar Wavelet Transform," Information Sciences, Vol. 269, 2014, pp.21-34.
DOI
|
3 |
Y. Chen "Cheating Prevention in Visual Cryptography," IEEE Trans. Image Process., Vol 21, No 7, 2012, pp.3319-3323.
DOI
|
4 |
Park Byeonghoon, Lim Joonghee, Shin Jonghong, "Imaged Cryptographic Algorithm Based on the Lifting Wavelet Transform," 2015 The Korea Society of Digital Industry & Information Management Falling Proceeding, 21th Nov. 2015, pp.47-51.
|
5 |
신종홍, "웨이브렛 변환 계수의 특성을 이용한 생체 영상 암호화 알고리즘," 디지털산업정보학회논문집, 제12권,ㅁ 제2호, 2016, pp.41-49.
|
6 |
K. Ramchanandran, M. Vetterli, "Best wavelet packet bases in a rate-distortion sense," IEEE Trans. on Image Processing, Vol. 2, No. 2, April, 1993, pp. 160-175.
DOI
|
7 |
M. Y. Gokhale, DaIjeet Kaur Khanduja, "Time Domain Signal Analysis Using Wavelet Packet Decomposition Approach," Int. J. communication, Network and System Science, 3, 2010, pp. 321-329.
DOI
|