Liu S,Chen T,Yao H,et al.A variable depth LSB data hidingtechnique in images[A].In:Proceedings of IEEE International Conference on Machine Learning and Cybernetics[C],Shanghai,China,2004,7:3990 ~ 3994.
[2]
Cachin C.An information-theoretic model for steganography[A].Portland:The 2nd Workshop on Information Hiding[C],Oregon,USA,1998,1524:306~318.
[3]
Solachidis V,Pitas I.Circularly symmetric watermark embedding in 2-D DFT domain[J].IEEE Transactions on Image Processing,2001,10(11):1741~1753.
[4]
Suhail M,Obaidat M.Digital watermarking-based DCT and JPEG model[J].IEEE Transactions on Instrumentation and Measurement,2003,52(5):1640 ~ 1647.
[5]
Kim S,Lee S,Kim T,et al.A video watermarking using the 3-D wavelet transform and two perceptual watermarks[A].In:International Workshop on Digital Watermark[C],South Korea,Seoul,2004:329 ~ 338.
[6]
Wu Y,Guan X,Kankanhali M,et al.Robust invisible watermarking of volume data using the 3D DCT[A].In:Computer Graphics International[C],Hong Kong,China,2001:359 ~ 362.
[7]
Tsai M,Hung H.DCT and DWT-based image watermarking by using sub-sampling[A].In:The 24th International Conference on Distributed Computing Systems Workshops[C],Tokyo,Japan,2004:184 ~ 189.
Lewis A,Knowles G.Image compression using the 2-D wavelet transform[J].IEEE Transactions on Image Processing,1992,1 (2):244 ~ 250.
[10]
Guzmán V,Miyatake M,Meana H.Analysis of a wavelet-based watermarking algorithm[A].In:Proceedings of the 14th International Conference on Electronic,Communication and Computes[C],Veracruz,Mexico,2004:283 ~ 287.
Cheng Q,Huang T.Optimum detection of multiplicative watermarks using locally optimum decision rule[A].In:IEEE International Conference on Multimedia and Expo[C],Japan,Tokyo,2001:309 ~ 312.