3Craver Scott, Memom Nasir, Yeo Boonlock, et al. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 573~586
4Hartung F H, Su J K, Girod B. Spread spectrum watermarking: Malicious attacks and counterattacks[A]. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, 1999. 147~158
5Voloshynovskiy S, Pereira S, Thierry P, et al. Attacks on digital watermarks: Classification, estimation based attacks, and benchmarks[J]. IEEE Communications Magazine, 2001, 39(8): 118~126
6Hartung F, Girod B. Watermarking of uncompressed and compressed video[J]. Signal Processing, Special Issue on Copyright Protection and Access Control for Multimedia Services, 1998, 66(3): 283~301
7Lancini R, Mapelli F, Tubaro S. A robust video watermarking technique in the spatial domain[A]. In: Proceedings of International Symposium on Video/Image Processing and Multimedia Communications, Zadar, 2002. 251~256
8Shan A, Salari E. Realtime digital video watermarking[A]. In: Proceedings of International Conference on Consumer Electronics 2002, Los Angeles, 2002. 12~13
9Shen K T, Chen L W. A new digital watermarking technique for video[A]. In: Recent Advances in Visual Information Systems: 5th International Conference, VISUAL, Hsin Chu, 2002. 269~275
10Deguillarme F, Csurka G, Ruanaidh J O, et al. Robust 3D DFT video watermarking[A]. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose: 1999. 113~124