3Cox I J;Killian J.Secures spread spectrum watermarking for multimedia[J],1997(12).
4Bender W;Gruhl D;Morimoto N.Techniquesfor data hiding[J],1996(3,4).
5Cox J;Killian J;Leighton;Shamoon T.Secure spread spectrum watermarking of digital images,1996.
二级参考文献11
1[1]G Voyatzis,I Pitas.The use of watermarks in the protection of digital multimedia products [C].Proceedings of the IEEE,1999,87(7):1197-1207.
2[2]R G Van Schyndel,A Z Tirkel,C F Osborne. A digital watermarks [A].In: IEEE Int.Conf.on Image Processing [C],1994,2:86-90.
3[3]D J Fleet. Embedding invisible information in color images [A].In: IEEE Int.Conf.on Image Processing [C],1997,1:532-535.
4[4]I J Cox,J Kilian,F T Leighton,et al.Secure spread spectrum watermarking for multimedia[C].IEEE Trans.on Image Processing,1997,6(12):1673-1687.
5[5]M D Swanson,M Kobayashi,A H Tewfik. Multiresolution data embedding and watermarking technologies [C].Proceedings of the IEEE,1998,86(6):1064-1087.
6[6]A Piva,M Barni,F Bartolini,et al. DCT-based watermark recovering without resorting to the uncorrupted original image[C].In:IEEE Int.Conf.on Image Processing,1997,1:520-523.
7[7]M Barni,F Bartolini,V Cappellini,et al. A DCT-domain system for robust image watermarking [J].Signal Processing,1998,66(3):357-372.
8[8]J Johnston,N Jayant,R Safranek. Signal compression based on models of human perception [C].Proceedings of the IEEE,1993,81(10):518-526.
9[9]L Torres,M Kunt. Video Coding,The Second Generation Approach [M].Kluwer Academic Publishers,1995.