Fridrich J,Goljan M,Du R,Invertible authentication,Proceedings of Spie,2001.
[2]
Du R,Fridrich J,Lossless authentication of MPEG-2 video,Piscataway,NJ,USA:IEEE Press,2002.
[3]
Yin P,Yu H H,Classification of video tampering methods and countermeasures using digital watermarking,Proceedings of Spie,2001.
[4]
Cox I J,Miller M I,The first 50 years of electronic watermarking,Journal of Applied Signal Processing,2002(2).
[5]
Honsinger C W,Jones P W,Rabbani M,Lossless Recovery of an Original Image Containing Embedded Data,US,6278791,2001.
[6]
Vleeschouwer C D,Delaigle J F,Macq B,Circular interpretation of bijective transformations in lossless watermarking for media asset management,IEEE Transactions on Multimedia,2003(1).
[7]
Shang Y,A new invertible data hiding in compressed videos or images,Washington DC,USA:IEEE Computer Society,2007.
[8]
Park J Y,Lim J H,Kim G S,Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious manipulation,New York,USA:IEEE Press,2002.