吴秋新,钮心忻,杨义先,等.信息隐藏技术-隐写术与数字水印.北京:人民邮电出版社,2001.[2]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling. in Proc. SPIE Conf. Human Vision and Electronic Imaging Ⅱ, 1997, Vol. 3016: 92- 99.[3]Herrera-Joancomarti J, Minguillon J, Megias D. A family of image watermarking schemes based on lossy compression. ITCC 2003, Proceedings. International Conference on Information Technology: Coding and Computing [computers and Communications], Las Vegas, Nevada USA, April 28 - 30, 2003:559 - 563.[4]Noore A. An improved digital watermarking technique for protecting JPEG images. ICCE 2003. IEEE International Conference on Consumer Electronics, Los Angeles, California USA, June 17 - 19, 2003:222 - 223.[5]Li Kan, Zhang Xiao-Ping. An image watermarking method integrating with JPEG-2000 still image compression standard.CCECE 2003, IEEE Canadian Conference on Electrical and Computer Engineering, Montreal, Canada, May 4- 7, 2003.Vol.3:2051 - 2054.[6]Li Yuanyuan.[J].Xu Luping. A blind watermarking of vector graphics images. ICCIMA 2003. Fifth International Conference on Computational Intelligence and Multimedia Applications,Xian, P.R.China, Sept 27 .2003,30:-[7]Ohbuchi R, Ueda H, Endoh S. Watermarking 2D vector maps in the mesh-spectral domain. SMI 2003. International Conference on Shape Modeling and Applications, Seoul, Korea, May 12- 15,2003:216 - 225.[8]Staring M, Oostveen J, Kalker T. Optimal distortion compensation for quantization watermarking. ICIP 2003. IEEE International Conference on Image Processing, Barcelona Spain, Sept. 14 - 17, 2003, Vol. 2:727 - 730.[9]Ashourian M, Ho Yo-Sung. Analysis of quantization watermarking in the wavelet transform domain. ISSPA 2003.Seventh International Symposium on Signal Processing and Its Applications, Paris, France, July 1 - 4, 2003, Vol. 2:375 - 378.
|