3Bender W, Gmhl D, Morimoto N, et al. Techniques for data hiding[ J] . IBM System Journal, 1996, 35(3---4):313-335.
4Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey[J]. Proc of IEEE, 1999, 87(7):1062-1078.
5Cox I J, Kilian Joe, Leightan Tom,Shamoon Tatal. Secure .Spread Spectrum Watermarking for Images [ J ]. Audio and Video.Proc. ICIP- 96, 1996, 3: 243- 246.
6Martin Kuuer, Stefan Winkler. A Vision- Based Masking Model for Spread - Spectrum Image Watermarking [ J ]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11(1): 16-25.
7Fabien A P, Ross J Petitcalas, Anderson, Markus G, Kuhn. Information Hiding-A Survey [J]. Proceedings of the IEEE, special issue on protection of multimedia content, 1987,(7) : 1062- 1078.
8Ingemar J Cox, Miller Matt L. The first 50 years of electrortic watermarking [J].Journal of Applied Signal Processing, 2002, 2:126 - 132.
9Zhe Song, Zhigeng Pan, Jiaoying Shi.Digital Sound Watermark Based on Improved Sinusoidal Analysis/Synthesis Model [ J ]. EG Muhimedia'99, Italy, Sept, 1999, 63-72.
10Bender W, Gruhl D, Morimoto N.Techniques for data hiding [ J ]. IBM System Journal, 1996, 35(3-4): 313-336.
5Siwei Lyu,Hany Farid. "Steganalysis Using Higher-Order Image Statistics"[J].IEEE Transactions On Information Forensics and Security,2006,(01):111-119.