[1] G. Langelaar, I. Setyawan, and R. L. Lagendijk, IEEE Signal Processing Mag. 17, (5) 20 (2000).
[2] Y. Hu and S. Zhu, Acta Opt. Sin. (in Chinese) 28, 1691 (2008).
[3] L. Zhang, W. Xiao, G. Qian, and Z. Ji, Chin. Opt. Lett. 5, 21 (2007).
[4] L. Li, B. Guo, and K. Shao, Chin. Opt. Lett. 5, 332 (2007).
[5] Z. Li, F. Xia, G. Zheng, and J. Zhang, Chin. Opt. Lett. 6, 251 (2008).
[6] Y. Wang, T. Liu, and J. Jiang, Chin. Opt. Lett. 6, 657 (2008).
[7] K.-S. Kim, M.-J. Lee, and H.-K. Lee, in Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing 477 (2007).
[8] E. Ganic and A. M. Eskicioglu, in Proceedings of the 2004 Workshop on Multimedia and Security 166 (2004).
[9] P. Bao and X. Ma, IEEE Trans. Circ. Syst. Video Technol. 15, 96 (2005).
[10] R. Eberhart and J. Kennedy, in Proceedings of the Sixth International Symposium on Micro Machine and Human Science 39 (1995).
[11] Y. Shi and R. C. Eberhart, in Proceedings of IEEE International Conference on Evolutionary Computation 1945 (1999).
[12] C.-C. Lai, H.-C. Huang, and C.-C. Tsai, in Proceedings of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing 469 (2008).
[13] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, IEEE Trans. Signal Processing 13, 600 (2004).
[14] V. Aslantas, A. L. Dogǎn, and S. Ozturk, in Proceedings of 2008 IEEE International Conference on Multimedia and Expo 241 (2008).
[15] S. Zhu and J. Liu, in Proceedings of 2008 International Symposium on Knowledge Acquisition and Modeling 668 (2008).