1 |
I. Cox, J. Bloom, and M. Miller, Digital Watermarking (Academic Pr, San Diago, 2001).
|
2 |
S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, London, 2000).
|
3 |
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Proceedings of the IEEE ICIP '97 6,1673-1687 (1997).
|
4 |
W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems J. 25, 313-335, 1996.
|
5 |
Dong-Hoon Woo, Ui-Pil Chong, "Audio watermarking using specific frequency coefficients" (in Korean), J. Acoust. Soc. Kr. 22, 269-275 (2003).
과학기술학회마을
|
6 |
Won-Kyo Jeong, Kyeong-Hwan Lee, Hong-Chae Woo, Yong-Doo Lee, "Robust audio watermarking using frequency coefficient analysis for MP3 compression Attack" (in Korean), J. Acoust. Soc. Kr. 24, 492-497 (2005).
과학기술학회마을
|
7 |
John Hedtke, MP3 and The Digital Music Revolution [Electronic Resource] (Top Floor Pub., Lakewood, 1999).
|
8 |
M. Swanson, B. Zhu, A. Tewfik, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Process. 66, 337-355 (1998).
DOI
ScienceOn
|
9 |
I. Cox and M. Miller, "A rview of wtermarking and the importance of perceptual modeling," Proceeding of SPIE, Human Vision & Electronics Imageing II 3016, 92-99 (1997).
|
10 |
Russell Shaw, Starting with MP3 (Prima tech, Columbus, 2001).
|