1 |
W. Stallings, Cryptography and Network Security, Principles and Practices, New Jersey, NJ: Prentice Hall 2003.
|
2 |
Y. H. Seo, H. J. Choi, J. S. Yoo and D. W. Kim, "Selective and adaptive signal hiding technique for security of JPEG2000," International Journal of Imaging Systems and Technology, Vol.23, No. 3, pp. 277-284, Aug. 2010.
|
3 |
Y. H. Seo, E. S. Choi, and D. W. Kim, "Efficient encryption technique of image using packetized discrete wavelet transform," Journal of Korea Institute of Information and Communication Engineering, Vol.17, No. 3, pp. 603-611, Mar. 2013.
DOI
|
4 |
S. H. Park, H. J. Choi, Y. H. Seo, and D. W. Kim, "Ciphering scheme and hardware implementation for MPEG-based image/video security," Journal of the Institute of Electronics and Information Engineers, Vol. 42, No. 2, pp. 27-36, Mar. 2005.
|
5 |
R. C. Gonzalez and R. E. Woods, Digital Image Processing, New Jersey, NJ: Prentice Hall, 2002.
|
6 |
F. Stajano and H. Isozaki, "Security issues for Internet applications," in Proceedings of Applications and the Internet (SAINT) Workshop, Nara: JP, pp. 18-24, 2002.
|
7 |
Middlebury Stereo Vision Page [Internet]. Available: http://vision.middlebury.edu/stereo/.
|
8 |
J. S. Jeong and Y. J. Kim, "Structural Similarity Index for Image Assessment Using Pixel Difference and Saturation Awareness," Journal of The Korean Institute of Information Scientists and Engineers, Vol. 41, No. 10, pp. 847-858, Oct. 2014.
|