1[1]Stefan K, Fabien A P. Information Hiding Techniques for Steganography and Digital Watermarking. London: Artech House, INC, 2000 被引量:1
2[2]Miller M L, Cox I J, Bloom J A. Informed embedding exploiting image and detector information during watermark insertion. In: Proc IEEE International Conference on Image Processing,2000, 3:1-4 被引量:1
3[3]Piva A, Barni M, Bartolini F. DCT-based watermark recovering without restoring to the uncorrupted original image. In :Proc ICIP'97, Atlanta, USA, 1997,I:520-523 被引量:1
4[4]Shapiro J M. Embedded image coding using zerotrees of wavelwt coefficients. IEEE Trans Signal Processing, 1993, 41 (12) :3445-3462 被引量:1
5[5]Watson A B, Yang G Y. Visibility of wavelet quantization noise. IEEE Trans Image Processing, 1997,6(8):1164-1174 被引量:1
6[6]Piva A, Barni M, Bartolini F, Cappellini V. Threshold selection for correlation-based watermarking detection. In: Proc COST 254 Workshop on Intelligent Communications, L' Aquila, Italy, 1998.67-72 被引量:1
7LIU R Z, TAN T N. Watermarking for digital images[A].Proc of ICSP'98[C]. San Jose, CA, USA, 1998. Vol.2: 944-947. 被引量:1
8COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997,6(12):1673-1687. 被引量:1
9SWANSON M D, et al. Robust audio watermarking using perceptual marking[J].Signal Processing,1998,66(3):337-355. 被引量:1
10SWANSON M D, et al. Transparent robust image watermarking[A]. Proc of ICIP'96[C]. Lausanne, Switzerland, 1996. 3:211-214. 被引量:1