2[1]Joachim J Eggers,Jonathan K Su,Bernd Girod. Asymmetric watermarking schemes,Sicherheit in Mediendaten.GMD Jahrestagung,Proceedings ,Springer Verlag, 2000
3[2]Scott Craver,Stefan Katzenbeisser. Copyright protection protocols based on asymmetric watermark:the ticket concept[C].In:Proceedings of the Sixth Conference on Communication and Multimedia Security(CMS'01),German ,2001: 159~170
4[3]Bruce Schneier. Applied Cryptograpy: Protocols, Algorithms,and Source Code in C[M].2nd ed,New York:John Wiley and Sons,1996
5[4]Frank Hartung,Bernd Girod.Copyright protection in video delivery networks by watermarking of pre-compressed video[C].In :2nd European Conference on Multimedia Applications,Services and Techniques (ECMAST'97), Milan, Italy, Lecture Notes in Computer Science,1997; 1242:423~436
6[5]Frank Hartung,Bernd Girod. Watermarking of uncompressed and compressed video[J].Signal Processing,Special issue on copyright protection and access control for multimedia services, 1998 ;66(3):283~301
7[6]Frank Hartung,Bernd Girod.Fast public-key watermarking of compressed video[C].In:Proceedings of the IEEE International Conference on Image Processing(ICIP97),Santa Barbara,CA,USA,1997;1:528~531
8[7]R G van Schyndel,A Z Tirkel,I D Svalbe. Key independent watermark detection[C].In:IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999; 1: 580~585
9[8]Joachim J Eggers,Jonathan K Su,Bernd Girod. Public key watermarking by eigenvectors of linear transforms[C].In :European Signal Processing Conference( EUSIPCO'2000 ) , Tampere,Finland,2000
10[9]Joachim J Eggers,Bernd Girod. Robustness of public key watermarking schemes[C].In:V3D2 Watermarking Workshop,Erlangen,Germany,1999