5Barr J,Bradley B,Hannigan BT.Using Digital Watermarks with Image Signature to Mitigate the Threat of the Copy Attack[A].Proc.of ICASSP'03[C].Hong Kong:ICASSP,2003,(3):69-72.
6COX IJ, KILIAN J, LEIGHTON T, et al. Secure spread spectrum watermarking for multimedia[ J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673 - 1687.
7BARNI M, BARTOLINI F, CAPPELLINI V, et al. A DCT_domain system for robust image watermarking[ J]. IEEE Signal Processing,1999, 66(3): 357 - 372.
8Liu Ju, Nie Kaibao, He Zhenya. Blind separation by redundancy reduction in a recurrent neural network. Chinese Journal of Electronics, 2001, 10(3): 415 -419.
9He Zhenya, Liu Ju, Yang Luxi. Blind separation of images using Edgeworth expansion based ICA algorithm. Chinese Journal of Electronics, 1999, 8(3): 278 -282.
10Kutter Martin, Voloshynovskiy Sviatoslav, Herrigel Alexander.The watermark copy attack. Proc. of the SPIE, Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, 2000,3971:371 - 380.