4[5]Moulin P,Koetter R.Data-hiding codes[C].Proceedmgs of the IEEE.Washington:IEEE Press,2005,93(12):2083-2126
5[7]Potdar V M,Han S,Chang E.A survey of digital image watermarking techniques[C].2005 3rd IEEE International Conference on Industrial Informatics.Perth:IEEE Press,2005:709-716
6[9]Hanaoka Y,Hanaoka G,Shikata J.Identity-Based Hierarchical Strongly Key-Insulated Encryp tion and its Application[J].LectNotes Comput SC,2005,3788:495-514
7[10]Attrapandung N,Cu I Y,CJal Ndo D.Relations Among Notions of Security for Identity Based Encryption Schemes[J].LectNotes Comput SC,2006,3887:130-141