2[1]Rank Hartung and Martin Kutter.Multimedia Watermarking techniques[J].IEEE,1999,87(7):1079-1107.
3[2]Caronni G.Ermitteln unauthorisierter Verteiler von maschinenlesbaren Datern[Z].ETH,Zurich, Switzerland Tech.Rep.,1993.
4[3]Tirkel A,Rankin G,Schyndel R,et al.Electronic water mark[J].in Proc. DICTA,1993.12.
5Bender W, Gruld D, Morimoto N, et a]. Teclmiques for data hiding. IBM System Journal, 1996, 35, (3&4) : 313- 336.
6Kobayashi. Digital Watermarking: Historical Roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
7Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE. proceeding on Vision, Signal and Image Processing, 1996. 8, 143, (4): 250-256.
8Jiri Fridrich. Applications of data hiding in digital images.In: the ISPAC'98 Conference in Melbourne, Australia, 1998.11.