1Da Chun-wu,Wen HsiangTsai.Embedding of Any Type of Data in Images Based on a Human Visual Model and Multiple-based Number Conversion[J].Pattern Recognition Le-tters,1999,20(11):1 500-1 517.
2Anderson R J,Petitcolas F.On the Limits of Steganography[J].IEEE Journal of Selected Areas in Communications,1998,16(4):474-481.
3[德]Bauer F L.密码编码和密码分析[M].北京:机械工业出版社,2001.
4Bender W,Gruhl D,Morimoto N,et al.Techniques for Data Hiding[J].IBM Systems Journal,1996,35(3-4):313-336.
5Brett T Hannigan,Alastair Reed,Brett Bradley.Digital Watermarking Using Improved Human Visual System Model[A].In Proceedings of SPIE 2001[C].California,USA,2001.468-474.
6Changsheng Xu,Jiankang Wu,Qibin Sun.Digital Audio Watermarking and Its Application in Multimedia Database[A].In ISSPA'99 [C].Brisbane,Australia,1999.91-94.
7Wu C P,Su P C,Kuo C C.Robust and Efficient Digital Audio Watermarking Using Audio Content Analysis.SPIE 2000.
8Eggers J J,Su J K,Girod B.A Blind Watermarking Scheme Based on Structured Codebooks.In Secure Images and Image Authentication,Proc.IEE Colloquium,4/1-4/6,London,UK,April 2000.
9Costa M H M.Writing on Dirty Paper[J].IEEE Transactions on Information Theory,1983,29(3):439-441.