2TZUNG HER CHEN,GWOBOA HORNG,WEI-BEI LEE. A pub- liely verifiable copyright-proving scheme resistant to malicious attacks[J]. IEEE Trans on Industrial Electronics, 2005,52 ( 1 ) : 327- 334.
3CHIN CHEN CHANG,PEI YU LIN. Adaptive watermark mechanism for rightful owership protectiong[J]. Journal of Systems and Software,2008,81 (7): 1118-1129.
4JOSEPH J K, RUANAIDH O, PEREIRA S. A secure robust digital image watermark [ C ]//Proc of SPIE, Electronic Imaging: Processing, Printing, and Publishing in Color. Zurich : [ s. n. ] , 1998 : 150- 163.
5COX I J, KILIAN J, LEIGHTON T, et al. A secure, robust watermark for multimedia[ C]//Proc of the 1st International Information Hiding Workshop Proceedings. Cambridge : [ s. n. ], 1996 : 185- 206.
6TANG Yuan-liang, WANG C P. A robust watermarking algorithm based on salient image features[ C]//Proc of International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Los Alamitos : IEEE, 2008 : 1137-1140.
7GAO Tie-gang, GU Qiao-lun. Reversible watermarking algorithm based on wavelet lifting scheme [ C ]//Proc of International Conference on Wavelet Analysis and Pattern Recognition. Piscataway: IEEE, 2007:1771-1775.
8GU Qiao-lun, GAO Tic-gang. Public watermarking for reversible image authentication[ C]//Proc of Congress on Image and Signal Processing. Los Alamitos:IEEE, 2008:95-99.
9GAO Tie-gang, GU Qiao-lun. Reversible image authentication based on combination of reversible and LSB algorithm[ C]//Proc of International Conference on Computational Intelligence and Security Workshops. Piscataway:IEEE, 2007:636-639.