Cox I J, Miller M L, Bloom J M. Digital Watermarking. United States of America, Mordan Kaufmann Publishers, 2002, chapter 1-2.[2]Perez-Gonzalea F, Hernandes J R, Balado F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001, 81(6): 1215-1238.[3]Su J K, Eggers J J, Girod B. Capacity of digital watermarks subjected to an optimal collusion attack. European Signal Processing Conference(EUSIPCO), Tampere, Finland, September 2000.[4]Eggers J J, Bauml R R, Girod B. Digital watermarking facing attacks by amplitude scaling and additive white noise. 4th Intl. ITG Conference on Source and Channel Coding, Berlin, Jan. 2002: 28-30.[5]Moulin P, OSullivan J A. Information-Theoretic Analysis of Information Hiding[J].IEEE Trans. on Information Theory.2003, 49(3):563-593[6]Moulin P, OSullivan J A. Information-theoretic analysis of watermarking. in Proceedings of the International Conference on Acoustics, Speech, and Signal processing, 2000, 6: 3630-3633.[7]OSullivan J A, Moulin P, Ettinger J M. Information-theoretic analysis of steganography. Proceedings of the IEEE International Symposium on Information Theory, Boston, Aug. 1998.[8]Eggers J J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, San Jose, Ca., Jan., 2002.[9]Cachin C. An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998: 306-318.[10]傅祖芸. 信息论基础理论及应用. 北京: 电子工业出版社,2001: 90-111.[11]Cox I J, Kilian J, Leightom T, Shamoon T. Secure spread spectrum watermarking for multimedia[J].IEEE Trans. on Image Processing.1997, 6(12):1673-1687[12]Cox I J, Miller M L, McKellips A. Watermarking as communications with side information[J].Proceedings of the IEEE.1999, 87(7):1127-1141[13]Chen B, Wornell G W. Achievable performance of digital watermarking systems. In Proceeding of the IEEE Intl. Conference on Multimedia Computing and Systems (ICMCS'99),[14]Florence, Italy, July 1999, 1: 13-18.[15]Gelfand S I, Pinsker M S. Coding for channel with random[16]Parameters. Problems of Control and Information Theory, 1980,[17]1): 19-31.[18]Costa M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-441[19]Chen B, Wornell G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[J].IEEE Trans. on Information Theory.2001, 47(4):1423-1443[20]Su J K, Eggers J J, Girod B. Andysis of digital watermarks subjected to optimum linear filtering and additive noise[J].Signal Processing.2001, 81(6):1141-1175[21]Chen B, Wornell G W. Dither modulation: a new approach to digital watermarking and information embedding. In Proceeding of SPIE Vol. 3675. Security and Watermarking of Multimedia Contents, San Jose, January 1999.[22]Chen B, Wornell G. Proprocessed and postprocessed quantization index modulation methods for digital watermarking. In Proceeding of SPIE Vol.3971; Security and Watermarking of Multimedia Contents Ⅱ, San Jose, January 2000. [20] Ramkumar M. Data hiding in multimedia: theory and application. Ph. D thesis, New Jersey Institute of Technology, Kearny, NJ, USA, 1999.[23]Moulin P, Mihgak M K. The parallel-gaussian watermarking game. UIUC Technique Report UIUC-ENG-01-2214, June 2001.Moulin P, Ivanovic A. The watermark selection game. Proceeding Conference on Information Sciences and Systems, Baltimore, MD, March 2001.
|