4Yu Chong - zhi, ct al. Compression and coding of moving picture and sound [ M]. Nanjing: Nanjing University Press, 1995.
5Jessica Fridrich, David Soukal. Matrix embedding for large payloads[ J]. Information Forensics and Security, IEEE Transacations on,2006,1 (3) :390 -395.
6Andreas Westfeld. Detecting low embedding rates [ C ] . Information Hiding 5th International Workshop,2002,329 -342.
7Song Hua, et al. MP3Stego hiding and detecting research[J]. Acta Scientianmm Naturalium University Sunyatseni, 2004,43 ( 2 ) : 221 -224.
8Gland F, Kabatiansky G. Information hiding by coverings [ C ] . Information Theory Workshop, 2003, 151 -154.
9Mohanmed F Mansour, Ahmed H Tewfik. Data embedding in audio using time -scale modification[ J] . Speech and Audio Processing, IEEE Transaction on, 2005,13(3) : 432 -440.
10R G van Schyndel,et al.A digital watermark .Proceedings 1994 International Conference on Image Processing .Austin,Texas,USA:IEEE Computer Society,1994.2.86-89.
1I. Daubechies. Where do wavelets comefrom?-A personal point ofview[J].Proc.IEEE, 1996,vol.84(5):510-513.
2A. E1 Dessouki, H.H. Zayed, R.O. E1 Safy. An Adaptive Steganographic Technique Based on Integer Wavelet Trans- form[J]. International Conference on Networking and Media Convergence, 2009:111-117.