Hartung F,Kutter M,Multimedia watermarking techniques,Proceedings of IEEE,1999(7).
[2]
Zeng W,Liu B,A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images,IEEE Transactions on Image Processing,1999(11).
[3]
Giannlula A,Boulgouris N V,Hatzinakos D K,Watermark detection for noisy interpolated images,IEEE Transactions on Circuits and systems-Ⅱ:Express Briefs,2006(5).
[4]
Birney K A,Fischer T R,On the modeling of DCT and subband image data for compression,IEEE Transactions on Image Processing,1995(2).
[5]
Reininger R C,Gibson J D,Distributions of the two-dimensional DCT coefficients for images,IEEE Transactions on Communications,1983(6).
[6]
Wu M,Yu H,Liu B,Data hiding in image and video:Part Ⅱ-Designs and applications,IEEE Transactions on Image Processing,2003(6).
[7]
Sayrol E,Vidal J,Cabanillas S,Optimum watermark detection in color images,London,England,1999.
[8]
Alexia B,Panagiotis T,Hidden messages in heavy-tails:DCT-domain watermark detection using alpha-stable models,IEEE Transctions on Multimedia,2005(3).
[9]
Hernandez J R,Amado M,Perez-gonzalez F,DCT-domain watermarking techniques for still images:Detector performance analysis and a new structure,IEEE Transactions on Image Processing,2000(6).
[10]
Birney K A,Fischer T R,On the modeling of DCT and subband image data for compression,IEEE Transactions on Image Processing,1995(3).
[11]
Adler R,Feldman R,Taqqu M S,A Guide to Heavy Tails:Statistical Techniques and Applications,Boston,MA,USA:Birkhauser,1998.
[12]
Lie Wen-nung,Lin Guo-shiang,A Feature-based classification technique for blind image steganalysis,IEEE Transactions on multimedia,2005(6).
[13]
Lam E Y,Goodman J W,A mathematical analysis of the DCT coefficient distributions for images,IEEE Transactions on Image Processing,2000(10).
[14]
John P N,Maximum Likelihood Estimation and Diagnostics for Stable Distribution,Boston:American University,1999.
[15]
Muralidhar R,Freeman C,Gerlach L K R,Robust adaptive signal processing methods for heterogeneous radar clutter scenarios,The Guide to computing Literature,2004(9).
[16]
Willinger W,Taqqu M S,Leland W E,Self-similarity in highspeed packet traffic:Analysis and modeling of ethernet traffic measurements,Statistical Science,1995(1).