[1]Nikolaidis N, Pitas I. Robust imagewatermarking in the spatial domain, Signal Processing, 1998,66(3):385~403.
[2]
[4]Barni M, Bartolini F, Cappellini V et al. A DCT-domain system for robust imagewatermarking. Signal Processing, 1998,66(3):357~372.
[3]
[6]?6 Hsu C ?T, Wu J ?L. Multiresolution watermarking for digitalimages. IEEETrans. on Circuits and Systems II-Analog and Digital Signal Processing, 1998,45(8):1097~1101.
[4]
[9]?9 Voyatzis?G, Pitas ?I. Digital image watermarking using mixingsystems.Computers & Graphics, 1998, 22(4):405~416.
[5]
[11]Kundur D, Hatzinakos D. A robust digital image watermarking method usingwavelet-based fusion. In:Proc. of ICIP\'97, Washington DC,1997,1:544~547.
[6]
[12]Hsu C T, Wu J L. Hidden digital watermarks in images. IEEE Trans. on ImageProcessing, 1999,8(1):58~68.
[7]
[14]Qiao L T, Nahrstedt K. Watermarking schemes and protocols for protecting rightfulownership and customer\'s rights. Journal of Visual Communication and Image Representation,1998,9(3):194~210.
[8]
[16]Petitcolas F, Anderson R J, Kuhn M G. Attacks on copyright marking systems.In:Proceeding of Conference on Infomation Hiding\'98,Portland Oregon, U.S.A,1998:218~238.
[3]Cox I J, Kilian J, Leighton F T et al.T. Secure spread spectrum watermarking formultimedia. IEEE Trans. on Image Processing, 1997,6(12):1673~1687.
[11]
[5]O\'Ruanaidh J J K, Csurka G. A bayesian approach to spread spectrum watermarkdetection and secure copyright protection for digital image libraries.In:Proc. of CVPR\'99,Fort Collins, Colorado, 1999,1:207~212.
[12]
[7]?7 Swanson M ?D, Zhu ?B, Tewfik A ?H. Multiresolution ?scene-based videowatermarking using perceptual models. IEEE Journal on Selected Areas in Communications,1998,16(4):?540~550.
[13]
[8]Chug T Y, Hong M S, Oh Y N et al. Digital watermarking for copyright protection ofMPEG2 compressed video. IEEE Trans. on Consumer Electronics, 1998,44(3):895~901.
[14]
[10]Barni M, Bartolini F, Cappellini V et al. Copyright protection of digital imagesby embedded unperceivable marks. Image and Vision Computing, 1998,16(12-13):897~906.
[15]
[13]Craver S, Memon N, Yeo B L et al. Resolving rightful ownerships with invisiblewatermarking techniques: Limitations, attacks, and implications. IEEE Journal on SelectedAreas in Communications, 1998,16(4):573~586.
[16]
[15]Kutter M, Petitcolas F. A fair benchmark for image watermarking systems.In:Electronic Imaging\'99, Security and Watermarking of Multimedia Contents, San Jose,CA.1999,3657:226~239.