1Anderson R ed. Information hiding. LNCS 1174, Berlin: Spinger-Verlag, 1996.
2Aucsmith D ed. Information hiding. LNCS 1525, Berlin: Spinger-Verlag, 1998.
3Pfitzmann A ed. Information hiding. LNCS 1768, Berlin: Spinger-Verlag, 1999.
4Moskowitz I S ed. Information hiding. LNCS 2137,Berlin: Spinger-Verlag, 2001.
5Katzenbeisser S, Petitcolas F A P. Information Hiding Techniques for Steganography and Digital Watermarking. Boston,London: Artech House,2000.
6Cox I, Miller M L, Bloom J. Digital Watermarking. San Francisco,San Diego: Mogran Kaufemann Publishers, 2001.
7Colins L. International between contract and tort in the conflict of laws. International and Comparative Law Quarterly, 1967,16:103.
8Johnson N F, Durie Z, Jajodia S. Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Boston, Dordreeht, London: Kluwer Academic Publishers, 2001.
9Johnson N F. Information hiding: Steganography, attacks,and countermeasures[Ph D dissertation]. School George Mason University, Virginia, USA,2000.
10Kurak C, McHughes J. A cautionary note on image downgrading. In: Proceeding of IEEE Computer Security Application Conference, 1992. 153~159.