31,Bender W,Gruhl D,Morimoto N et al.Techniques for data hiding, IBM System Journal, 1996,35(3&4):313~335.
44,齐东旭. 分形及其计算机生成. 北京:科学出版社,1997:36~39.
55,Shamir A. How to share a secret, Comm ACM, 1979,22(11):612~613.
66,Mintzer F, Braudaway G W, Bell A E. Opportunities for watermarking standards, Communications of the ACM, 1998,41(7):57~64.
77,Berghel H. Digital watermarking makes its mark. Networker:The Craft of Net Co mputing, 1998,2(4):30~39.
88,Pitas I. A method for watermark casting on digital images, IEEE Transactions on Circuits and Systems for Video Technology, 1998,8(6):775~780.
99,Kankanhalli M S, Rajmohan, Ramakrishnan K R. Content based watermarking of im ages. In:Multimedia'98 Proceedings of the 6th ACM International Conference on Mu ltimedia, 1998:61~70.
1010,Chiouting Hsu,Jaling Wu.DCT-Based watermarking for video. IEEE Transactio ns on Consumer Electronics, 1998,44(1):206~216.