[1]
Joseph J. K, Ruanaidh O, Thierry P, in: Rotation, scale and translation invariant spread spectrum digital image watermarking[J], Signal Processing, 1998, 66(5): 303– 317.
DOI: 10.1016/s0165-1684(98)00012-7
Google Scholar
[2]
Cox J, Miller L, and Mckellips L, in: Watermarking as Communications with Side Information[J], Proceedings of the IEEE, 1999, 7: 1127-1140.
Google Scholar
[3]
Moulin P, in: The role of information theory in watermarking and its application to image watermarking[J], Signal Processing, Special Issue on Information Theoretic issues in Digital Watermarking, June 2001, 81: 1121-1139.
DOI: 10.1016/s0165-1684(01)00037-8
Google Scholar
[4]
Moulin P, and Liu J, in: Analysis of multiresolution image denoising schemes using generalized-gaussian and complexity priors[J], In IEEE Trans. on Information Theory, April 2010, 45: 909–919.
DOI: 10.1109/18.761332
Google Scholar
[5]
Sullivan K, Madhow U, Chandrasekaran S, and Manjunath B. S, in: Steganalysis of spread spectrum data hiding exploiting cover memory[C], SPIE2005, 5681: 38-46.
DOI: 10.1117/12.588121
Google Scholar
[6]
Wang L. Y, Cui L. R, et al, in : Availability of Markov Repairable Systems with Changeable Operating Regimes [C], IEEE the 17th International Conference on Industrial Engineering and Engineering Management, 2010, 1: 924-926.
DOI: 10.1109/icieem.2010.5646473
Google Scholar
[7]
Batu T. G, Guha S, and Kannan S, in: Inferring Mixtures of Markov Chains[R], In ACM Symposium on Theory of Computing, 2006: 247-257.
Google Scholar
[8]
Zou D, Shi Q, Su W, Xuan G, in : Steganalysis based on Maerkov model of thresholded prediction-error image[C], IEEE International Conference on Multimedia Engineering( ICME 2006): 1365-1368.
DOI: 10.1109/icme.2006.262792
Google Scholar
[9]
Information on http: /vision. ece. ucsb. edu/~sullivak/Research_imgs.
Google Scholar
[10]
Cox J, Kilian J, Leighton T, and Shamoon T, in: Secure spread spectrum watermarking for multimedia [J], IEEE Trans. on Image Processing, Nov. 1997, 6: 1673-1687.
DOI: 10.1109/83.650120
Google Scholar
[11]
Zhao Huimin, Chi Yanli, Zhang Huile, in: Study of An Information Hiding Method Research of Joint Adaptive Quantization Index Modulation and Channel-Coding[J], Journal of Circuits and System, 2007, 12(2): 69-72.
Google Scholar
[12]
Zhao Huimin, Guo Yizhen,Ding Xiaoyan, in : An Optimum Method Research Based on Bit Plane Combination of Digital Image and Fingerprint Watermarking [J], Acta Scientiarum Naturalium Universitatis Sunyatseni, 2010, 49(6): 64-67.
Google Scholar