Mobile QR Code QR CODE


2018 the market analysis of overseas contents, KOCCA.URL
Lee J., 2014, Implementation of anti-screen capture modules for privacy protection, Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 1, pp. 91-96DOI
Charteris J., Gregory S., Masters Y., 2014, Snapchat ‘selfies’: The case of disappearing data, eds.) Hegarty, B., McDonald, j., & Loke, S. K., Rhetoric and Reality: Crit. Perspect. Educ. Tehnol., pp. 389-393URL
Kim W., Lee S., Seo Y., 2006, Image fingerprinting scheme for print-and-capture model, Pacific-Rim Conference on Multimedia. Springer Berlin Heidelberg, pp. 106-113DOI
Hou J., Kim D., Song H., Lee H., 2016, Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye, in Proc. of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 169-174DOI
Ji S., Lee H., 2018, Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System, IEEE Trans. Circuits Syst. Video Technol., pp. 2296-2309DOI
Yamamoto H., Hayasaki Y., Nishida N., 2004, Secure information display with limited viewing zone by use of multi-color visual cryptography, Opt. Express, Vol. 12, No. 7, pp. 1258-1270DOI
Yamamoto H., Hayasaki Y., Secure display that limits the viewing space by use of optically decodable encryption, in Advanced Optical and Quantum Memories and Computing IV, vol. 6482. International Society for Optics and Photonics, 2007, p. 64820C.DOI
Naor M., Shamir A., 1994, Visual Cryptography, Advances in Cryptography-EUROCRYPT’94, Lecture Notes in Computer Science 950, pp. 1-12, Springer-VerlagDOI
Shyu S. J., Chen M.-C., Chao K.-M., 2009, Securing information display for multiple secrets, Optical Engineering, Vol. 48, No. 5, pp. 057005DOI
Yamamoto H., Suyama S., 2011, Secure display by use of multiple decoding masks based on visual cryptography, in Industry Applications Society Annual Meeting (IAS), 2011 IEEE, pp. 1-5DOI
Park S., Kang S., 2017, Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique, KSII Trans. Inf Syst., pp. 3664-3677DOI
Brettel H., Shi L., Strasburger H., 2006, Temporal image fusion in human vision, Vision Res., Vol. 46, No. 6, pp. 774-781DOI
Nguyen N-V., Rigaud C., Burie J-C., Comic characters detection using deep learning, In Proceedings of the 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), Kyoto, Japan, 9-15 November 2017, pp. 41-46DOI
Khan F. S., Anwer R. M., van de Weijer J., Bagdanov A. D., Vanrell M., Lopez A. M., 2012, Color attributes for object detection., in CVPR., pp. 3306-3313DOI
Zheng Y., Zhao Y., Ren M., Yan H., Lu X., Liu J., Li J., 2019, Cartoon face recognition: A benchmark dataset., arXiv:1907.13394.DOI
Redmon J., Divvala S., Girshick R., Farhadi. A., 201, You only look once: Unified, real-time object detection., arXiv preprint arXiv:1506.02640URL
Redmon J., Farhadi. A., 2017, Yolo9000: Better, faster, stronger., In Computer Vision and Pattern Recognition (CVPR), 2017 IEEE Conference on, pages 6517-6525. IEEEURL
Girshick R., Donahue J., Darrell T., Malik. J., 2014, Rich feature hierarchies for accurate object detection and semantic segmentation., In Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, pages 580-587. IEEEURL
Girshick. R. B., 2015, Fast R-CNN., CoRR, abs/1504.08083URL
Ren S., He K., Girshick R., Sun. J., 2015, Faster r-cnn: Towards real-time object detection with region proposal networks., arXiv preprint arXiv:1506.01497DOI
Redmon J., Darknet: Open source neural networks in c, 2013-2016URL
Trieu. DarkflowURL