2VAN SCHYNDEL R G, TIRKEL A Z,OSBORNE C F. A digital watermark[C]//Proc. of the ICIP'94 : Vol 2.[S.I.]:[s.n.],1994:86-90.
3ZHEMING L, CHUNHE L, DIANGUO X, et al. Semifragile image watermarking method based on index constrained vector quantization[J].IEEE Electronics Letter,2003,39(1):35-36.
5朱近康(ZHU Jin-kang).扩展频谱通信及其应用(Spread Spectrum Communication and Application)[M].合肥:中国科学技术大学出版社(Hefei:University of Science and Technology of China Press),1994..
6Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
7Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
8Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
9Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
10Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274