2Tikel A Z, Rankim G A, Schyndel R M. Electronic Watermark[A]Digital Image Compute,Technol & App.[C]. Sydney, 1993:663-667.
3Marvel M, Boncelet C G, Retter C T. Reliable Blind Information Hiding lbr Images[DB/OL]. 2nd Int. Workshop on Info. Hidding[C],1998.
4Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding[J].IBM System J., 1996, (35):313-336.
5Barni M, Bartolin F, Capplin V, et al. A DCT Domain System For Robust Image Watermarking[J]. Signal Processing,1998,(66):357-372.
6Cox I J, Kilian J, Leighton F T, et al. A Secure, Robust Watermark for Multimedia. Proc. of the 1^st Information Hiding.Workshop. Edited by Anderson R, LN CS, Springer-Verlag, New York, 1996, I 174:183-206.
7Jerry D, Berger G T, Lookabaugh T, et al. Digtital Compression for Multimedia Principles&Standards, 2000.
8Gravers S,Memon N,Yeo B,et al. Resolving Rightlhl Ownership with Invisible Watermarking Techniques [J]. IEEE Journal on Special Areas in Communication, 1998,16(4): 573-586.
9Pita S. A Method for Signature Casting o Digital Images[A]. Proc.Int: Conf. on Human Visual Electronical Imaging[C], 1996,3:215.