[1]
R B Wolfgang, C I Podilchuk, E J Delp. Perceptual Watermarks for Digital Images and Video [J]. Proceedings of the IEEE (S0018-9219), 1999, 87(7): 1108-1126.
DOI: 10.1109/5.771067
Google Scholar
[2]
HE Hong-jie, CHEN Fan. On the Security of the Self-Embedding Watermarking Scheme[J]. ACTA ELECTRONICA SINICA. 2007, 35(3): 557-562.
Google Scholar
[3]
Ingermar J Cox , Joe Kilian , Tom Leighton , et al . Secure-Spread-spectrum watermarking for images , audio and video. Proc. ICIP'96 , 3 : 243 —246.
DOI: 10.1109/icip.1996.560429
Google Scholar
[4]
Huang Jiwu , Shi Yun Q , Shi Yi. Embedding image water-marks in DC components. IEEE Tans. On Circuits and Systems f or Video Technology , 2000 , 10 : 974 —979.
DOI: 10.1109/76.867936
Google Scholar
[5]
Juan R Hernández , Martín Amado , Fernando Pérez-González. DCT-domain watermarking techniques for stillimages : detector performance analysis and a new structure. I EEE Tans. on Image Processing , 2000 , 9 (1) : 55 —68.
DOI: 10.1109/83.817598
Google Scholar
[6]
Kundur D , Hatzinakos D. A robust digital image water-marking method using wavelet-based fusion. In : Proc. I EEE Internat . Conf . Image Processing , 1997 , 1 : 544 —547.
DOI: 10.1109/icip.1997.647970
Google Scholar
[7]
Piva A , Barni M , Bartolini F. Copyright protection of digital images by means of frequency domain watermarking. In : Proc S PI E , Mathematics of Data/ Image Coding , Compression , and Encryption , 1998 , 3456 : 25 —35.
DOI: 10.1117/12.330369
Google Scholar
[8]
Liu Xu-chong, WANG Jian-xin, LUO Yong, A Watermarking Algorithm for Image Authentication Based on Statistical Model and Directional Wavelet[J], Journal of Hunan University(Natural Sciences), 2010, 37(11), 77-81.
Google Scholar
[9]
WANG Jian ping , LV Shu wang, Image Watermarking Algorithm Based on Singular Value Decomposition and Contourlet Transform[J], CHINESE JOURNAL OF SENSORS AND ACTUATORS 2009, 22(6): 883-886.
Google Scholar
[10]
Do Minh N , Vetterli Martin. Contourlets : A new directional multiresolution image representation. Signals , Systems and Computers , 2002 , 1 : 497-501.
DOI: 10.1109/acssc.2002.1197232
Google Scholar
[11]
LI Ji-guo, YU Chun-wu , Mathematic Fundamental of Information Secrecy[M], WuHan: WuHan University Press, 2006:139-146.
Google Scholar