2[2]Fabien A P Petitcolas,Ross J Anderson,Markus G Kuhn.Information Hiding-A Survey[J].Proceedings of the IEEE,special issue on protection of multimedia content.July 1999,87(7):1062-1078.
3[3]Pfitzmanb B,Waidner M.Anonymous Fingerprinting[A].In:Konstanz.Eurocrypt'97 Number 1233 in Lecture Notes in Computer Science[C].Germany:Springer-Verlag.1997:210-219
4[4]Naor M,Pinkas B.Threshold Traitor Tracing[A].In:Santa Barbara.18th Annual International Cryptology Conference[C].California:Springer-Verlag-1462.1998:956-974.
5[5]Hembrooke E F.Identification of Sound and Like Signals[P].United States Patent:3004104,1996.