4Barni M, Bartolini F, Cappellini V, et al. Water-marking-Based Protection of Remote Sensing Images: Requirements and Possible Solutions [ C]. Mathematics of Data/Image Coding, Compression, and Enoryption, with Applications, San Diego, 2001.
5Barni M, Bartolini F, Cappellini V, et al. Water- marking Techniques for Electronic Delivery of Remote Sensing Images[J]. Optical Engineering, 2002, 41(9): 2 111-2 119.
6姚哗.基于内容的可视媒体多级授权理论与方法研究[D].武汉:武汉大学,2008.
7WenJ T, Severa M, Zeng W J, et al. A Format-compliant Configurable Encryption Framework for Access Control of Video[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2002,12(6): 545-557.
8Mollin R A. An Introduction to Cryptography[M]. Boca Raton, FL : CRC Press, 2006.
9Wang Xianmin, Guan Zequn, Wu Chenhan. An Adaptive Wavelet 2 dimension Watermarking Algo rithm for Remote Sensing Images [J]. Electronic Imaging and Multimedia Technology, 2005, 4 : 649- 656.
10Koblitz N. Elliptic Curve Cryptosystems[J].Mathematics of Compution American Mathematical Society,1987(48) ,203-309.