[1] Tirkel A Z,Rankin G A,Van Schyndel R M,et al. Electronic Watermark[C]//Digital Image ComputingTechnology and Applications DICTA 93. Sidney: Maquarie University, 1993: 666-673. [2] 孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学出版社,2004. [3] 王颖,肖俊,王蕴红.数字水印原理与技术[M].北京:科学出版社,2007. [4] Chen B, Wornell G W. Provably Robust Digital Watermarking[C]//Proc. of the SPIE: Multimedia Systems and ApplicationsⅡ.Bellingham:Society of Photo-Optical Instrumentation Engineers, 1999, (3845): 43-54. [5] Schyndel R G, Tirkel A Z, Osborne C F. A Digital Watermark[C]// First IEEE International Image Processing Conference. Austin: University of Texas, 1994, (2): 86-90. [6] Cox I J, Miller M L.数字水印[M].王颖,黄志蓓,译.北京:电子工业出版社,2003. [7] Cravers, Menmonn, Yeobl. Resolving Rightful Ownerships with Invisible Watermarking Techniques[J]. IEEE Journal on Seclected Areas in Communications. 1998, 16 (4): 573-586. [8] Eggers J J, Su J K, Girod B. A Blind Watermarking Scheme Based on Structured Codebooks[J]. IEE Colloquium (Digest), 2000, (39): 27-47. [9] Watson A B.DCT Quantization Matrices Visually Optimized for Individual Images[J].Human Vision,Visual Processing and Digital Display.1993,(1):202-216. [10] Ahumada A J, Peterson H A. Luminance-Model-Based DCT Quantization for Color Image Compression[C]// Proceeding of the SPIE. 1992, (1666): 365-374. [11] Cox I J, Kilian J, Leighton T, et al. Secure Spread Spectrum Watermarking for Images, Audio and Video[C]// Proceedings of the 1996 IEEE International Conference in Image Processing. CA: IEEE, Los Alamitos, 1996,(3): 243-246. [12] 杨德刚,陈永红.在数字图像中嵌入多水印的算法研究[J]. 计算机工程与应用,2005 ,41 (21):41-44. [13] 杨洋,陈小平. 一种数字音频多水印算法[J]. 苏州大学学报:工学版,2004, 24(1):18-22. [14] 马苗,田红鹏.一种多类多水印方案[J],西南交通大学学报, 2003,38(2): 235-239. [15] 李京兵,黄席樾 .一种鲁棒的多水印嵌入和检测算法与仿真[J]. 计算机仿真,2005,22(9):254-258. [16] 张伟,高珍,张志浩.基于正交向量组的多水印算法研究[J].计算机工程.2006,32 (4) :174-176. [17] 李秋珍, 邹复好.基于CDMA技术的多水印算法[J].计算机应用,2005 ,25 (11) :2538-2540. [18] Xiao Jun, Wang Ying. Multiple Watermarking based on Spread Transform[C]// 8th International Conference on Signal Processing(ICSP2006),2006,(4):2640-2643. [19] Cox I J, Kilian J, Leighton T,et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans. on Image Processing, 1997,6(12):1673-1687. [20] 张良,张军,宗杰.数字图像频率域多水印共存技术研究[J].电视技术,2003 ,(4): 66-67. [21] Mintzer F, Braudaway G W.If one watermark is good,are more better?[C]// IEEE International Conference on Acoustics,Speech and Signal Processing,1999:2067-2069. [22] Wu M, Tang E, Liu B. Data Hiding in Digital Binary Image[C]// IEEE International Conference on Multi-Media and Expo. New York: Los Alamitos, 2000, (1): 393-396. [23] Ahumada A J, Peterson H A. Luminance-Model-Based DCT Quantization for Color Image Compression[C]// Proceeding of the SPIE,1992,(1666):365-374. [24] 王丽娜,张焕国.信息隐藏技术与应用[M].武汉:武汉大学出版社,2003. [25] Lu H, Kot A C, Cheng J. Secure Data Hiding in Binary Document Images for Authentication[C]// Proceedings of the 2003 IEEE International Symposium on Circuits and Systems. Bangkok: Institute of Electrical and Electronics Engineers Inc, 2003,( 3): 806-809. |