2[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
3[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
4[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
5[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
6[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
7[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
8[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
9[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
10[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.