Mobile QR Code QR CODE

REFERENCES

1 
2018 the market analysis of overseas contents, KOCCA.URL
2 
Lee J., 2014, Implementation of anti-screen capture modules for privacy protection, Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 1, pp. 91-96DOI
3 
Charteris J., Gregory S., Masters Y., 2014, Snapchat ‘selfies’: The case of disappearing data, eds.) Hegarty, B., McDonald, j., & Loke, S. K., Rhetoric and Reality: Crit. Perspect. Educ. Tehnol., pp. 389-393URL
4 
Kim W., Lee S., Seo Y., 2006, Image fingerprinting scheme for print-and-capture model, Pacific-Rim Conference on Multimedia. Springer Berlin Heidelberg, pp. 106-113DOI
5 
Hou J., Kim D., Song H., Lee H., 2016, Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye, in Proc. of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 169-174DOI
6 
Ji S., Lee H., 2018, Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System, IEEE Trans. Circuits Syst. Video Technol., pp. 2296-2309DOI
7 
Yamamoto H., Hayasaki Y., Nishida N., 2004, Secure information display with limited viewing zone by use of multi-color visual cryptography, Opt. Express, Vol. 12, No. 7, pp. 1258-1270DOI
8 
Yamamoto H., Hayasaki Y., Secure display that limits the viewing space by use of optically decodable encryption, in Advanced Optical and Quantum Memories and Computing IV, vol. 6482. International Society for Optics and Photonics, 2007, p. 64820C.DOI
9 
Naor M., Shamir A., 1994, Visual Cryptography, Advances in Cryptography-EUROCRYPT’94, Lecture Notes in Computer Science 950, pp. 1-12, Springer-VerlagDOI
10 
Shyu S. J., Chen M.-C., Chao K.-M., 2009, Securing information display for multiple secrets, Optical Engineering, Vol. 48, No. 5, pp. 057005DOI
11 
Yamamoto H., Suyama S., 2011, Secure display by use of multiple decoding masks based on visual cryptography, in Industry Applications Society Annual Meeting (IAS), 2011 IEEE, pp. 1-5DOI
12 
YovoURL
13 
Park S., Kang S., 2017, Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique, KSII Trans. Inf Syst., pp. 3664-3677DOI
14 
Brettel H., Shi L., Strasburger H., 2006, Temporal image fusion in human vision, Vision Res., Vol. 46, No. 6, pp. 774-781DOI
15 
Nguyen N-V., Rigaud C., Burie J-C., Comic characters detection using deep learning, In Proceedings of the 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), Kyoto, Japan, 9-15 November 2017, pp. 41-46DOI
16 
Khan F. S., Anwer R. M., van de Weijer J., Bagdanov A. D., Vanrell M., Lopez A. M., 2012, Color attributes for object detection., in CVPR., pp. 3306-3313DOI
17 
Zheng Y., Zhao Y., Ren M., Yan H., Lu X., Liu J., Li J., 2019, Cartoon face recognition: A benchmark dataset., arXiv:1907.13394.DOI
18 
Redmon J., Divvala S., Girshick R., Farhadi. A., 201, You only look once: Unified, real-time object detection., arXiv preprint arXiv:1506.02640URL
19 
Redmon J., Farhadi. A., 2017, Yolo9000: Better, faster, stronger., In Computer Vision and Pattern Recognition (CVPR), 2017 IEEE Conference on, pages 6517-6525. IEEEURL
20 
Girshick R., Donahue J., Darrell T., Malik. J., 2014, Rich feature hierarchies for accurate object detection and semantic segmentation., In Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, pages 580-587. IEEEURL
21 
Girshick. R. B., 2015, Fast R-CNN., CoRR, abs/1504.08083URL
22 
Ren S., He K., Girshick R., Sun. J., 2015, Faster r-cnn: Towards real-time object detection with region proposal networks., arXiv preprint arXiv:1506.01497DOI
23 
Redmon J., Darknet: Open source neural networks in c, 2013-2016URL
24 
Trieu. DarkflowURL