1Van Schyndel R G, Tirkel A Z, Osborne C F. A DigitalWatermark. ICIP-1994: 86-90
2Ikolaidis N N.Copyright Protection of Images using RobustDigital Signatures. ICIP1996: 2168-2171
3Cox I J, Lilian J, Leighton T,et al. Secure Spread Spectrum Watermarking for Multimedia NEC Technical report.1995
4Cox I J, Linnartz J-P M G. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications, 1998,16(4): 587-593
5Cox I J, Ki Lion J, Leightou T, et al.Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans on Image Processing, 1997,6(12): 1673-1687
6Cox I J , Miller M L , BloomJ A. 王 颖,黄志蓓等译.数字水印. 北京:电子工业出版社,2003
7Petitcolas F A P,Anderson R J, Kuhn M G. Information Hiding-A Survey. IEEE, Special Issue on Protection of Multimedia Content,1999,87(7):1062-1078
8齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用.中国科学(E辑),2000,30 (5):440-447
9张静,张春田.二值图像数字水印技术综述.计算机工程,2005,31(3):1-3,25
10尹浩,林闯,邱锋等.数字水印技术综述.计算机研究与发展.2005,42(7):1093-1099
11Zhang T, Ping X. A NewApproach to Reliable Detection of LSB Steganography in Natural Images. Signal Processing, Elsevier Science,2003,83(10):2085-2093
12Zhou J C,Tang X H,Li G F.Mapping Transforms and Periodicity of Digital Watermarking.Transaction of North Industry University,2000,12(13):13-16
13陈铭,平西建. 基于Arnold变换的图像信息伪装算法. 计算机应用研究.2006,23(1):235-259 |