[7]Smith J R, Comiskey B O. Modulation and information hiding in images. In: Wo rkshopon Information Hiding, University of Cambridge,UK, May 1996:463~470.
[5]
[3]Lin C Y, Chang S F, Distortion modeling a nd invariantextraction for digita l imageprint-and-scan process. In:Intl. Symp. on Multimedia Information Proce ssing (ISMIP99),Taipei,Taiwan,Dec.1999.
[6]
[4]Lin C Y. Public watermarking surviving general scaling andcropping: An appli cationfor print-and-scan process,In: Multimedia and Security Workshop at ACM Multimedia 99,Orlando, FL, Oct. 1999.
[7]
[6]Cox I J , Kilian J , Leighton T et al. Secure spread spectrum watermark ing forimages, audio and video. In: International conference on image processing(ICIP\'96),(III)1996:243~246.
[8]
[8]Ramkumar M. Data hiding in multimedia-theory andapplications(Ph.D.Dissertation),Jan. 2000.