4C C Chang,T C Wu.Remote Password Authentication with Smart Cards[J].IEE Proceedings-E,1991,138(3):165-168.
5G Voyatzis,Ipitas.The Use of Watermarks in Protection of Digital Multimedia Products[J].Proceedings of IEEE,1999,87(7):1197-1207.
6R C Merkle.One- way Hash Functions and DES[C].Advances in Cryptology,CRYPTO'89,Lecture Notes in Computer Science,vol.435,1989.428-466.
7R Ohbuchi,et al.Watermarking Three-dimensional Polygoal Models through Geometric and Topological Modifications[J].IEEE Journal on Selected Areas in Communications,1998,16(4):551-560.
8L Z Cheng,X Hu,Y Luo.Integer Discrete Cosine Transform and Its Fast Algorithm[J].Electronics Letters,2001,37(1):64-65.