2Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
3KOC H E,Proc 1995 IEEE Workshopon Nonlinear Signal and Image Processing,1995年
4Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
5Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997
6Wong P W.A public key watermark for image verification and authentication. In: Proc.of the IEEE International Conference on Image Processing (ICIP’98) [C], Chicago, Illinois, USA . 1998
7Lin C Y,Chang S F.Semi -Fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II , EI’ 00[C], San Jose, CA, USA . 2000
8Lin C Y,Chang S F.A robust image authentication method surviving JPEG lossy compression. In:Proceedings of SPIE International Conference onStorage and Retrieval of Image/Video Database, EI’98[C], San Jose, CA , U SA . 1998
9Lin C Y,Chang S F.A robust image authentication method distinguishing JPEGcompression from malicious manipulation. . 1997
10Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding—A survey. Proc. of the IEEE, Special Issue on Protection of Multimedia Content . 1999