1R.H.Koenen,J.Llacy, M.Mackay,and S.Mitchell,"The Ic, ng march to interoperable digital rights management," Proc.IEEE,vol 92, no.6.pp.883-897,jun.2004.
2S. He and M. Wu,"Collusion-resistant video fingerprinting for large user group," IEEE Trans.lnf.Forensicso vol. 2, no. 4, pp.697 709, Dec. 2007.
3Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu, Fin- gerprinting Compressed Multimedia Signals, IEEE TRANISACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEM-BER 2009.
4J.G.Prozkis, Digital Communications,4th ed,New York:MCGrzw, Hill, 2000.
5M.Wu and B.Liu,"Oata hiding in image and video:Part-I-- Fundamental issues and solutions," IEEE Trans.Image Processing, vol,12,pp.685-695,June 2003.
6H.S.Stonej'Analysis of attacks on image watermarks with ran- domized coefficient," NEC Research Inst.,Princeton,NJ,Tech,Rep, 960-045,1996.