[1] Cox I J,Kilian J,Leighton F T,et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997,6 ( 12) : 1673 - 1687.
[2] Kang X,Huang J,Zeng W. Improving robustness of quantization-based image watermarking via adaptive receiver[J]. IEEE Transactions on Multimedia, 2008, 10( 6) : 953 - 959.
[3] Tan L,Fang Z J. An adaptive middle frequency emb-edded digital watermark algorithm based on the DCT domain [A]. Proceedings of the 2008 International Conference on Management of e-Commerce and e-Government[C]. Nanchang: IEEE Computer Society, 2008: 382 -385.
[4] 黄继武,Shi Y Q,程卫东. DCT 域图象水印: 嵌入对策与算法[J]. 电子学报, 2000, 28( 4) : 57 - 60.
[5] Shih F Y,Wu S Y T. Combinational image watermarking in the spatial and frequency domains[J]. Pattern Recognition, 2003, 36( 4) : 969 -975.
[6] Chang C C,Chen T S,Chung L Z. A steganographic method based upon JPEG and quantization table modification [J]. Information Science,2002,141: 289 - 302.
[7] 余鹏飞,刘兵. 基于离散余弦变换的大容量信息隐藏盲提取算法[J]. 计算机应用,2006,26 ( 4) : 815 - 817.
[8] 刘光杰,戴跃伟,孙金生,等. 用于图像的高容量信息隐藏算法[J]. 信息与控制,2007,36 ( 1 ) : 102 - 106.
[9] Koch E,Zhao J. Toward robust hidden image copyright labeling[A]. Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing[C]. Neos Marmaras, Greece: IEEE, 1995: 452 - 455.
[10] 江雪梅. 数字作品版权保护与认证的若干基本理论与关键技术研究[D]武汉: 武汉理工大学信息工程学院, 2007.