1[1]C I Podilchuk,E J Delp. Digital watermarking:Algorithms and applications[J].IEEE Signal Processing Magnzine,2001;18(4) :33~46
2[2]G Voyatzis,I Pitas.The use of watermarks in the protection of digital multimedia products[J].Proceedings of the IEEE,1999;87(7):1197~1207
3[3]A Z Tirkel,C F Osbome,R G van Schyndel. Image watermarking-a spread spectrum technique[C].In:IEEE 4th International Symposium on Spread Spectrum Techniques and Applications,1996:vol.Ⅱ,785~789
4[4]M M Yeung,F Mintzer. An invisible watermarking techniques for image verification[C]In:IEEE International Conference on Image Processing(ICIP'1997), 1997: vol Ⅱ,680~683
5[5]F Bartollini,A Tefas,M Barni et al. Image authentication techniques for surveillance applications[J].Proceedings of the IEEE,2001 ;89(10):1403~1418
6[6]M P Queluz,P Lamy.Spatial watermark for image verification[C].In:SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ,Jan.2000:vol.3971,120~130
7[7]D Kundur,D Hatzinakos. Digital watermarking for telltale tamper proofing and authentication[J].Proceedings of the IEEE, 1999;87(7): 1167~1180
8[8]C-S Lu,H-Y M Liao. Multipurpose watermarking for image authentication and protecti6n[J].IEEE Transactions on Image Processing,2001;10(10): 1579~1592
9[9]G J Yu,C-S Lu,H-Y M Lian et al.Mean quantization blind watermarking for image authentication[J].In:IEEE International Conference on Image Processing ( ICIP'2000 ), Vancouver, BC, Canada, 2000; vol .Ⅲ,706~709
10[10]S Mallat. A theory for multiresolution signal decomposition:The wavelet representation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989; 11 (7) :674~693