1I.J. Cox, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6 (12): 1673 - 1687.
2N. F. Johnson, S. Jajodia. Exploring Steganography:seeing the unseen. IEEE Transactions on Computer,1998, 31(2): 26-34.
3W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM System Journal, 1996, 35(3): 313- 336.