8QI DONG-XU ,ZOU JIANCHUN, HAN XIAOYOU. A new class of scrambling tnmsfonnation and it's application in the image information covering [J]. Science in china Series,2000,43(3) :304 -312.
9SWANSON M D, ZU B, TEWFIKA H. Robust data hiding for images [J]. Proc IEEE 7th Digital Signal Processing Workshop ( DSP 96) , 1996 (9) :37-40.
10KUHN M G, ANDERSON R J. Soft tempest : Hidden data transmission using electromagnetic emanations Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science) [C] . Aucsmith D. Berlin : Springer-Verlag , 1998:124 - 142.
5SWANSON M D, ZU B, TEWF IKA H. Robust data hiding for images [ J]. Proc IEEE 7th Digital Signal Processing Workshop ( DSP 96), 1996(9) : 37 -40.
6QI DONGXU, ZOU JIA CHUN, HAN XIAOYOU. A New Class of Scrambling Transformation and It's Application in The Image Information Covering [ J ]. Science in china Series, 2000,43 ( 3 ) : 304 -312.
7Hans G E.Windows Emulation.http://www. linux-magazine.com/issue/03/WindowsEmulation.pdf
9Cox I J, Kilian J, Leighton F T. Secure spreads spectrum watermar- king for multimedia [ J ]. IEEE Trans on Image Processing, 1997, 6 (12) : 1673-1687.
10Chung K L, Chang L C. Large encryption binary images with higher security [J]. Pattern Recognition Letters, 1998, 19(5):461-468.