[2]Bender W, Gruhl D, Morimoto N et al. Techniques for data hiding. IBM System Journal, 1996,35(3&4):313~336.
[2]
[4]Voyatzis G, Nikolaidis N, Pitas I. Digital watermarking: An overview. In:9th European Signal Processing Conference, Island of Rhodes, Greece, 1998:9~12.
[3]
[5]Jiri Fridrich. Applications of data hiding in digital images. In:the ISPAC\'98 Conference in Melbourne, Australia, 1998.11.
[4]
[6]Mahalingam Ramkumar. Data hiding in multimedia-theory and applications.[Ph.D. Degree], New Jersey: Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
[5]
[7]Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92~99.
[9]Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102~112.
[8]
[10] Van Schyndel R, Tirkel A, Osborne C. A digital watermark. In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex., IEEE Press, 1994:86~90.
[9]
[12] Nikolaidis N, Pitas I. Copyright protection of images using robust digital signatures. In: IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta, IEEE Press, 1996:2168~2171.
[10]
[15] Hui Xiang et al. Digital watermarking systems with chaotic sequences. SPIE Proceeding on Security and Watermarking of Multimedia Contents, San Jose, 1999,3657:449~457.
[11]
更多...
[12]
[21] Christine I Podilchuk, Zeng Wenjun. Digital image watermarking using visual models. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:100~111.
[13]
[24] 黄继武, SHI YunQ, 姚若河. 基于块分类的自适应图象水印算法. 中国图象图形学报,1999,4(8):640~643.
[14]
[26] Petitcolas Fabien A P, Anderson Ross J, Kuhn Markus G. Attacks on copyright marking systems. In: Information Hiding\'98 Conference, Second International Workshop, Volume Springer Lecture Notes in Computer Science, Portland, Oregon, USA, 1998,1525:218~238.
[15]
[28] Emil Praum et al. Robust mesh watermarking. http://www.cs.princeton.edu/gfx/proj/meshwm, 1999.
[16]
[1]Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996.8,143(4):250~256.
[17]
[3]Kobayashi. Digital watermarking: Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
[18]
[11] Maxemchuk N F. Electronic document distribution. AT&T Technical Journal, 1994.9,73(5):73~80.
[19]
[13] Hartung F, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding. SPIE Proceeding on Multimedia Computing and Networking, San Jose, 1997,3020:264~273.
[20]
[14] Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio. SPIE Proceedings on Security and Watermarking of Multimedia Contents, San Jose, 1999,3657:194~202.
[21]
[16] Zhao J, Koch E. Embedding robust labels into images for copyright protection. In: Proceedings of the KnowRight\'95 Conference on Intellectual Property Rights and New Technologies ,Vienna, Austria, 1995:241~251.
[22]
[17] Cox I J, Kilian J, Leighton T et al. A secure, robust watermark for multimedia. In: Proceedings of Info Hiding\'96, Cambridge University, London, England, 1996:185~206.
[23]
[18] Barni M, Bartolini F, Cappellini V et al. A DWT-based technique for spatial-frequency masking of digital signatures. SPIE Proceeding on Security and Watermarking of Multimedia Contents, 1999,3657:31~39.
[24]
[19] Cox I J, Kilian J, Leighton T et al. Secure spread spectrum watermarking for images, audio and video. IEEE Proceeding on International Conference on Image Processing, 1996,3:243~246.
[25]
[20] Cox I J, Kilian J, Leighton T et al. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997,6(12):1673~1687.
[27] Scott Craver, Nasir Memon, Boon-Lock Yeo. Resolving rightful ownerships with invisible watermarking techniques:limitations, attack, and implications. IEEE journal on selected areas in communication, 1998,16(4):573~586.