3Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Attacks on copying marking systems [OL]. http://www, cl.cam. ac. uk/Research/Security/.
4Fabien A P Petitcolas, Ross J Anderson. Weaknesses of copyright marking systems [OL]. http://www, cl. cam. ac. uk/Research/Security/.
5Karlheinz Brandenbrug, Gerhard Stoll. ISO-MPEG-1 audio: A generic standard for coding of high-quantity digital audio [J].Audio Engineer Society, 1994, 42(10) : 780--792.
6Bender W, Gruhl D, Morimoto N, et al. Technique for data hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336.
7Gruhl D, Bender W, Lu A. Echo Hiding in Information Hiding[M]. In: Anderson R J, ed. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996, 1174:295--315.
8Lie Wen-Nung, Chang Li-Chun. Robust and high-quality timedomain audio watermarking subject to psychoacoustic masking[J]. Circuits and Systems, 2001, 2:245--248.
9Lu Chunshien, Liao Hongyuan, Mark Chen Lianghua.Multipurpose audio watermarking [A]. In: Proceedings of the 15th International Conference on Pattern Recognition,Barcelona, Spain, 2000, Ⅲ: 286--289.
10Chang L, Moskowitz I S. Critical analysis of security in voice hiding techniques [A]. In: Proceedings of the International Conference on Information and Communications Security, vol 1334 of Lecture Notes in Computer Science [C]. Berlin:Springer, 1997. 203--216.