Guo Huiping, Georganas N D. Digital Image Watermarking for Joint Ownership Verification without a Trusted Dealer // Proc of the International Conference on Multimedia and Expo. Baltimore, USA, 2003: 497500
[2]
Wang F H, Jain L C, Pan J S. Design of Hierarchical Keys for a Multiuser Based Watermarking System // Proc of the International Conference on Multimedia and Expo. Taipei, China, 2004: 919922
[3]
Chang C C, Lin I C. A New (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image // Proc of the International Conference on Communication Technology. Beijing, China, 2003: 196202
[4]
Hyvarinen A, Oja E. Independent Component Analysis: A Tutorial. Neural Networks, 2000, 13(4/5): 411430
[5]
Zhang Li, Wei Gang, Zhang Jihong. A New Adaptive Closed Loop Robust Blind Image Digital Watermarking in Wavelet Domain. Acta Electronica Sinica, 2003, 31(10): 14761480 (in Chinese) (张 力,韦 岗,张基宏.一种小波域自适应鲁棒闭环数字盲水印技术.电子学报, 2003, 31(10): 14761480)
[6]
Sundaramorthy G, Raghuveer M R, Diana S A. Bispectral Reconstruction of Signals in Noise Amplitude Reconstruction Issues. IEEE Trans on Acoustic, Speech, Signal Processing, 1990, 38(7): 12971300
[7]
Hsu C T, Wu Jaling. Hidden Digital Watermarks in Images. IEEE Trans on Image Processing, 1999, 8(1): 5868
[8]
Pereira S, Pun T. Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans on Image Processing, 2000, 9(6): 11231129
[9]
Gui Guofu, Jiang Lingge, He Chen. Watermarking for Joint Ownership Verification of Digital Images. Journal of Electronic Imaging, 2006, 15(1): 1013
[10]
Zou Xinguang, Sun Shenghe. Information Hiding Using Secret Sharing Scheme // Proc of the 1st International Conference on Innovative Computing, Information and Control. Beijing, China, 2006, Ⅰ: 484 487
[11]
Shamir A. How to Share a Secret. Communications of ACM, 1979, 22(11): 612613