3HSU Chiou Ting, WU Ja Ling. Hidden digital watermarks in images[ J]. IEEE Transactions on Image Processing, 1999, 8 ( 1 ) :58-68.
4COX I J, MILLER M L. A review of watermarking and the importance of perceptual modeling [ C ]// Proceeding SPIE Conference on Human Vision and Electronic Imaging, Feb 10- 12, 1997, San Jose, CA, USA. 1997: 92-99.
5VOYATZIS G,PITAS I. The use of watermarks in the protection of digital multimedia products [ J ]. Proceedings of IEEE, 1999,87 ( 7 ) : 1197-1207.
6BENDER W, GRUHL D, MORIMOTO N, et al . Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3/4): 313- 336.
7LANGELAAR G C, VAN-DER-LUBBE J C A, LAGENDIJK R L. Robust labeling methods for copy protection of images [ C]//Proceeding of IS&T and SPIE Conference on Storage and Retrieval for Image and Video Database, Feb 8-14, 1997, San Jose, CA, USA. 1997: 298-309.
8CHEN B, WORNELL G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 47(4) : 1423-1443.
9ZORMAN M, KOKOL P, FEUER E, et al. Logistic maps define software development [ C ]//Proceedings of 7th IASTED International Conference on Software Engineering and Applications, Nov 3-5, 2003, Marina Rey, CA, USA. 2003: 733 -736.
10DEVANEY R L, An introduction to chaotic dynamical systems [ M]. Reading, MA, USA: Addison Wesley, 1989:48-49.