中文部份:
[1] 吳成柯, 戴善榮, 程湘君, 雲立實譯(民八二),數位影像處理,初版,台北:儒林圖書有限公司,pp.225-228,譯自Rafael C. Gonzalez and Richard E. Woods著。
[2] 林禎吉, 賴溪松(民八七),「數位浮水印的技術」,資訊安全通訊,第四卷,第三期,87年6月,pp. 5-11。[3] 黃國峰, 張真誠, 黃明祥(民八八),「漫談數位浮水印技術」,資訊安全通訊,第四卷,第四期,88年9月,pp. 11-17。[4] 李遠坤, 陳玲慧(民八八),「數位影像之資訊隱藏技術探討」,資訊安全通訊,第四卷,第四期,88年9月,pp. 18-30。[5] 張隆君, 陳宛渝, 鍾國亮(民八八),「淺談數位影像之保密技術」,資訊安全通訊,第四卷,第四期,88年9月,pp. 33-36。[6] 陳佩君(民八八),「網際網路數位浮水印應用之研究」,國立清華大學電機工程研究所碩士論文。[7] 張聰明(民八九),「容忍失真壓縮的資料隱藏技術之研究」,中工理工學院電子工程研究所碩士論文。[8] 王世昌, “應用人類視覺JND特性、波元轉換及向量編碼於影像壓縮,” http://www.ee.yuntech.edu.tw/~dsplab /paper/wang/
[9] 戴敏倫, 李素瑛, 周義昌(民八八),「多媒體資訊安全~數位浮水印」,電子月刊,第五卷,第三期,88年3月,pp. 97-106。[10] 賴溪松, 韓亮, 張真誠(民八八),「近代密碼學及其應用」,二版,台北:松崗圖書有限公司。
英文部份:
[11] Chang Hen-Ming and Chen Ling-Hwei (1999), “An Invisible Watermarking Method for, Color Image, ” Proc. 12th IPPR Conference on Computer Vision, Graphics and Image Processing, pp. 22-29.
[12] Schyndel, R. G. van, Tirkel, A. Z., Mee, N. R. A., Osborne C. F. (1994), “A digital watermark,” Proceeding of the Internal National Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86-90.
[13] Wolfgang, R. B., and Delp E. J. (1996), “A Watermark for Digital Image,” In Internal Conference on Images Processing, IEEE, Lausame Switzerland, 16-19 Sep. 1996, pp. 219-222.
[14] Lee, Y.K., and L.H. Chen, (2000), “High Capacity Image Steganographic Model,” submitted to IEEE Proceedings Vision, Image and Signal Processing, Vol. 147, No 3, pp 288-294, June 2000.
[15] Bo. and Bradley Dickinson (1997), “Adaptive Watermarking In The DCT Domain”, IEEE Int. Conference Acoustics, Speech and Signal Processing, pp. 2985-29887.
[16] Hsu Chiou-Ting and Wu Ja-ling (1999), “Hidden Digital Watermarks in Image,” in IEEE Transactions on image processing, Vol. 8, No. 1, January.
[17] Young-Sik Kim, O-Hyung Kwon, and Rae-Hong Park (1999), “Wavelet Based Watermarking Method for Digital Images Using The Human Visual System”, Proc. of the IEEE International symposium on circuits and system, Vol.4, pp. 80-83.
[18] Cox, I. J., Kilia, J., Leighton, T., and Shamoon, T. (1997), “Secure Spread Spectrum Watermarking for multimedia”, IEEE Transactions on Image Proc., Vol.6, No 12, pp.1673-1687.
[19] A. Piva, M , Barni ,F. and Cappellini V., (1997), “ DCT based Watermark Recovering Without Resorting to the Uncorrupted Original Image”, In Internal Conference on Images Processing 97, Vol.1, pp.520-523, Santa Barbara, CA, Oct 1997.
[20] Forney, G. D. (1973), “The Viterbi Algorithm,” Proceeding of the IEEE, vol 61, No 3, pp 268-278, Mar 1973.
[21] Voyatzis, G., and Pitas, I. (1996), “Application of Toral Automorphisms in Image Watermarking”, IEEE ICIP’96, Vol.2, pp. 237-240.
[22] Hong-Bin Wan, Ying-Lin Lo, Tao-I Hsu, Kung-Shry Wu and Chien-Liang Chuang (2000), “An invisible watermarking technology using channel code in color image”, the 13th IPPR Conference on Computer Vision, Graphics and Image Processing 2000, Taipei, Republic of China, pp 292-299.
[23] Podilchuk, C., and Zeng, W. (1998), “Image-Adaptive Watermarking Using Visual Models”, IEEE Journal on Selected Areas in Communications, Vol.16, No.4, pp.525-539, May 1998.
[24] Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. (1996), “Secure Spread Spectrum Watermarking for Images, Audio and Video”, Proceeding of ICIP’96, Vol.3, pp. 243-246.
[25] Barnett R., Pearson D. (1998), “Attack operators for digitally watermark images”, IEEE Proceedings Vision, Image and Signal Process. , Vol. 145, No. 4, pp. 271-279.
[26] Barnett R., Pearson D. (1998), “Frequency mode LR attack operator for digitally watermarked images”, Electronics Letters 17th September 1988, Vol. 34, No. 19, pp. 1837-1839.
[27] Sklar B. (1988), Digital Communications. Englewood Cliffs, NJ: Prentice-Hall, pp.246-380, 1988.
[28] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn (1999), “Information Hiding —A Survey,” In the Proceedings of the IEEE, special issue on protection of multimedia content, Vol. 87, No. 7, July 1999.
[29] Matthew Holliman, Nasir Memon (2000), “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” in IEEE Transactions on image processing, Vol. 9, No. 3, March 2000.
[30] Sklar B. (1988), Digital Communications. Englewood Cliffs, N.J: Prentice-Hall, pp.546-549, 1988.
[31] Viterbi, Andrew, J. (1995), CDMA: principles of Spread Spectrum Communication., MA: Addison-Wesley Publishing Company, pp. 11-36.
[32] Pei Soo-Chang, Chen Yu-Hau and Torng Ru-Fang(1999), “Digital Image and Video Watermarking Utilizing Just-Noticeable-Distortion Model,” The 12th IPPR Conferen ce on Computer Vision, Graphic and Image Processing, pp.174-182.
[33] Anil K. Jain(1989), “Fundamentals of Digital Image Processing,” Prentice-Hall international, Inc., pp.49-54.
[34] A Lewis and G. Knowles(1992), “Image compression using the 2-D wavelet transform,” IEEE Transactions On Image Processing, Vol. 1, No.2, pp. 244-250.
[35] B. Barbier, “Wavelet for image quality on LCD matrix display,” Conference of the 1991 International Display Research Conference, pp. 171-174.