2Cox I., Miller L., Bloom. A Digital Watermarking. New York: Morgan Kaufmann, 1999
3Bender W., Gruhl D., Morimoto N.. Technique for data hiding. IBM Systems Journal, 1996, 35(3-4): 313-336
4Langelaar G.C., van der Lubbe J.C.A., Lagendijk R.L.. Robust labeling methods for copy protection of images. In: Proceedings of the SPIE, Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, 1997, 3022: 298~309
5Nikolaidis N., Pitas I.. Robust image watermarking in the spatial domain. Signal Processing, 1998, 66(3): 385~403
6Du Z.Y., Zhou Y., Lu P.Z.. An optimized spatial data hiding scheme combined with convolutional codes and hilbert scan. In: Proceedings of the 3rd IEEE Pacific Rim Conference on Multimedia, Taiwan, 2002, 97~104
7Fleet D., Heeger D.. Embedding invisible in formation in color images. In: Proceedings of the IEEE International Conference on Image Processing, San Jose, CA, USA, 1997, 532~535
8Kutter M., Jordan F., Bossen F.. Digital signature of color images using amplitude modulation. In: Proceedings of the SPIE, Storage and Retrieval for Image and Video Database V, San Jose, CA, USA, 1997, 518~526
9Kutter M., Winkler S.. A vision-based masking model for spread-spectrum image watermarking. IEEE Transactions on Image Processing, 2002, 11(1): 16~25
10Braudaway G.W.. Protecting publicly-available images with an invisible image watermarking. In: Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, USA, 1997, 524~527