1Moulin P, O' Sullivan Joseph A. Information-Theoretic Analysis of Information Hiding. IEEE Transactions on information theory, 49(3).
2Wang P H W, Au O C. A capacity estimation technique for JPEG-to-JPEG image watermarking. Circuits and Systems for Video Technology. IEEE Transactions on, 2003,13(8)746-752.
3Wang P H W, et al. Capacity for jpeg2000-tojpeg2000 images watermarking. Multimedia and Expo, 2003.ICME'03. Proceedings. 2003 International Conference on,2003,2(6-9)485- 488.
4StirMark Kugn M. [EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/, 1997-11.
5Aguste Kerckhoff. La Cryptographie Militaire. Journal des Sciences Militaires, IX (Jan., Feb.): 5-38, 161-191,1883.
6Petitcolas F A P, Anderson R, Kuhn M G. Information Hiding: A Survey. Proceedings of the IEEE, 1999, 87(7):1062-1077.
7Kutter M, Voloshynovskiy S, Herrigel A. The watermark copy attack. in Security and Watermarking of Multimedia Contents II, SPIE-3971:371-380, 2000.
8Linnartz J P M G, van Dijk M. Analysis of the sensitivity arrack against electronic watermarks in images. in Workshop on Information hiding, Portland, OR, 1998, 15(4):258-272.
9Hartung F, Kutter M. Multimedia Watermarking Techniques. Proceedings the IEEE, 1999, 87(7): 1079-1107.?A
10Watson A B. DCT quantization matrices optimized for individual image. Human Vision, Visual Processing, and Digital Display Ⅳ, 1993,SPIE-1913: 202-216.