[1] Hartung F, Kutter M. Multimedia watermarking techniques [J]. Proc IEEE, 1999,87(7) :1079-1107.
[2] Swanson D M, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking technologies[J]. Proc IEEE,1998, 86(7):1064-1087.
[3] Cox I J, Kilian J, Leighton F T, et al. Secure spread spec trum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997, 6(12) :1673-1687.
[5] Ejima M and Miyazaki A. A wavelet-based watermarking for digital images and video [J]. IEICE Trans Fundamentals, 2000, 83A(3) :532-540.
[6] Podilchuk I C, Zeng W. Image-adaptive watermarking using visual models[J]. IEICE Trans. Fundamentals, 2000, 83-A (3):532-540.
[7] Zeng W, Liu B. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images [J]. IEEE Trans on Image Processing, 1999, 11 (8) :1534-1548.
[8] Bender W, Gruhi D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35(4,5) :313-336.
[9] Baudry S, Delaigle J, Sankur B, et al. Analyses of error cor rection strategies for typical communication channels in watermarking[J]. Signal Processing, 2001,81(3): 1239-1250.