1Nikolaidis A,Tsekeridou S.A survey on watermarking application scenarios and related attacks[M].Signal Processing.2001.991~995.
2Cravers, Menmonn,Yeobl, et al. Resolving rightful ownerships with invisible watermarking techniques:limitations,attacks,and implications[J].IEEE Journal on seclected areas in communications,1998,16(4):573-586.
3Schneider B Applied cryptography[M].New York:Whley,1996.