1Q Ruanaidh J J,Dowling W J,Boland F M.Watermarking digital images for copyright protection.In:IEEE proceeding on Vision,Signal and Image Processing,1996,143 (4):250-256.
2Bender W,Gruhl D,Morimoto N,et al.Techniques for data hiding.IBM System Journal,1996,35 (3-4):313-336.
3Kobayashi.Digital Watermarking:Historical Roots.IBM Research Reports,Tokyo Research Laboratories,1997.
4Voyatzis G,Nikolaidis N,Pitas I.Digital watermarking:an overview.In:9th European Signal Processing Conference,Island of Rhodes,Greece,1998:9-12.
5Jiri Fridrich.Applications of data hiding in digital images.In:the ISPAC'98 Conference in Melbourne,Australia,1998.11.
6Ramkumar M,Akansu A N.Image watermarks and counterfeit attacks:some problems and solutions.In:Proceeding on Content Security and Data Hiding in Digital Media Conference,Newark,NJ,1999,102-112.
2Lin Eugenet,Proceedings of the Image Processing Image Quality Image Capture Systems Conference(PICS'99)2528,1999年,274页
3蒋茂森,概率论与数理统计简明教程,1986年
4I J Cox,J K ilian,F T Leighton and T Shammon. Secure Spread Spectrum Watermarking for Multimedia[ J]. IEEE Transactions on Image Processing, 1997.
5Mercy George,Jean - Yves Chouinard and Nicolas Georganas.Spread Spectrum Spatial and Spectral Watermarking for Images and Video[J]. 1999 IEEE Canadian Workshop on Information Theory, 1999.
6A Piva,M Barni,F Bartolini,V Cappellini. DCT - based Watermark Recovering without Resorting to the Uncorrupted Original Image[C]. 1997 International Conference on Image Processing, 1997.