4I.J. Cox, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6 (12): 1673 - 1687.
5N. F. Johnson, S. Jajodia. Exploring Steganography:seeing the unseen. IEEE Transactions on Computer,1998, 31(2): 26-34.
6W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM System Journal, 1996, 35(3): 313- 336.
7CHEN T S,CHANG C C,HWANG M S.A virtual image cryptosystem based on vector quantization[J].IEEE Transactions on Image Processing,1997,7(10):1 485-1 488.
8CHANG C C,HWANG K F.Hiding Images Using Dynamic Bit Replacement and Human Visual System[M].Distributed Multimedia Databases:Techniques and Applications, Idea Group Publishing,2001.
9FLOYD R W,STEINBERG L.An adaptive algorithm for spatial grayscale[A].Proceedings of International Symposium of SID[C].1975.36-37.
10WANG S G.Digital watermarking using conjugate halftone screens[P].United States Petent Number 5 790 703.