1Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8,143 (4):250-256.
2Bender W, Gruhl D, Morlmoto N et al, Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
3Kobayashi. Digital watermarking:Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
4Voyatzis G, Nikolaidis N, Pitas 1. Digital watermarking: An overview. In:9th European Signal Processing Conference.Island of Rhodes,Greece. 1998:9-12
5Jiri Fridrich. Appiications of data hiding in digital images. In:the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
6Mahalingam Ramkumar. Data hiding in multimedia-theory and apphcations. [Ph. D. Degree], New Jerseyl Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
7Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92-99.
8Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102-112.
9Van Schyndel R, Tirkel A. Osborne C. A digital watermark,In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex. , IEEE Press, 1994:86-90.
10Maxemchuk N F. Electronic document distribution, AT&T Technical Journal, 1994. 9,73(5):73-80.