[1]Herodotus, The Histories, J. M. Dent & Sons, Ltd, London, England, pp.1-2, 1992.
[2]鄧白樺、姚文俊、滕峻輝,密碼傳奇,世茂出版社,台北,第1-288頁,2003。
[3]Bauer, F. L., Decrypted Secrets—Methods and Maxims of Cryptology, Springer-Verlag, Heidelberg, Germany, pp. 23-24, 1997.
[4]尤新剛、周琳娜、郭云彪,“信息隱藏學科的主要分支及術語”,信息隱藏全國學術研討會論文集,第43-50頁,2001。
[5]王小川,語音訊號處理,全華科技圖書股份有限公司,台北,第1-416頁,2004。
[6]http://www.physics.uiowa.edu/~umallik/adventure/sound.htm。
[7]http://www.sounderpro.com.tw/Reviw/IEM/iem.html。
[8]Zwicker, E. and Fastl, E., Psychoacoustics, Springer-Verlag, Berlin, Germany, pp. 78-79, 1999.
[9]http://themusicpage.org/data/Sensitivity.html。
[10]Johnson, N., Duric, Z., and Jajodia, S., Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Kluwer Academic Publishers, Boston, MA, pp. 24-25, 2001.
[11]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM System Journal, Vol. 35, pp. 313-336, 1996.
[12]Katzenbeisser, S. and Petitcolas, F. A. P., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, pp.44-45, 2000.
[13]Cvejic, N., Algorithms for Audio Watermarking and Steganography, OULU university press, Oulu Finland, pp. 1-111, 2004.
[14]Cvejic, N. and Seppanen, T., “Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method,” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), pp. 533-537, 2004.
[15]Michiel, V., Fons, B., Arno, L., and Stephane, C., “High Capacity Reversible Watermarking for Audio,” Proceedings of SPIE-IS&T Electronic Imaging, Vol. 5020, pp. 1-11, 2003.
[16]Cvejic, N. and Seppanen, T., “A Wavelet Domain LSB Insertion Algorithm for High Capacity Audio Steganography,” Proc. IEEE Digital Signal Processing Workshop, Callaway Gardens, GA, pp. 53-55, Oct. 2002.
[17]Gruhl, D., Lu, A., and Bender, A., “Echo Hiding,” Information Hiding: First International Workshop, Cambridge, pp. 295-315, May 30-Jun. 1, 1996.
[18]吳蕙如,“以回聲資訊隱藏為基礎的音訊浮水印技術設計”,碩士論文,國立交通大學資訊工程研究所,新竹,第1-99頁,1999。[19]Huang, D. Y. and Yeo, T. Y., “Robust and Inaudible Multi-Echo Audio Watermarking,” PCM2002, LNCS 2532, Springer-Verlag Berlin Heidelberg, pp. 615-622, 2002.
[20]Oh, H. O., Seok, J. W., Hong, J. W., and Youn, D. H., “New Echo Embedding Technique for Robustand Imperceptible Audio Watermarking,” Proceedings of the International Conference on Acoustic, Speech and Signal Processing, Utah, USA, Vol. 3, pp. 1341-1344, May 2001.
[21]Ko, B., Nishimura, R., and Suzuki, Y., “Time-Spread Echo Method for Digital Audio Watermarking Using PN Sequences,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, pp. 2001–2004, 2002.
[22]Ruiz, F. and Deller, J., “Digital Watermarking of Speech Signals for the National Gallery of the Spoken Word,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Istanbul, Turkey, pp. 1499–1502, 2000.
[23]Tilki, J. F. and Beex, A. A., “Encoding a Hidden Auxiliary Channel onto a Digital Audio Signal Using Psychoacoustic Masking,” Proceedings of the IEEE South East Conference, Blacksburg, VA, pp. 331-333, 1997.
[24]Robert, A. and Picard, J., “On the Use of Masking Models for Image and Audio Watermarking,” IEEE Transactions on Multimedia, Vol. 7, No. 4, pp. 727-739, Aug. 2005.
[25]Swanson, M. D., Bin, Z., Tewfik, A. H., and Boney, L., “Robust Audio Watermarking Using Perceptual Masking,” Signal Processing, Vol. 66, No. 3, pp. 337-355, 1998.
[26]Kim, Y. H., Kang, H., Kim, K., and Han, S. S., “A Digital Audio Watermarking Using Two Masking Effects,” PCM2002, LNCS 2532, Springer-Verlag Berlin Heidelberg, pp. 655-662, 2002.
[27]Tilki, J. F., and Beex, A. A., “Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking,” Proceedings of the 7th International Coference on Signal Process Apps. and Tech., pp. 476-480, 1996.
[28]Cedric, T., Adi, R., and Mcloughlin, I., “Data Concealment in Audio Using a Nonlinear Frequency Distribution of Prbs Coded Data and Frequency-Domain Lsb Insertion,” Proceedings of IEEE Region 10International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, pp. 275-278, 2000.
[29]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1623, 2003.
[30]Jovi, B., Have A Nice Day, Track1, Universal Music Ltd., 2005.
[31]Symphony No.39 E flat major K.543-Minuet, Mozart Effect, Track 10, UFO Music Ltd., 1997.
[32]Garden S., Truly, Madly, Completely - The Best of Savage Garden, CD1, Track5, SONYBMG, 2005.
[33]空中英語教室2006年2月份Super MP3光碟,曉騰國際,2006。
[34]Wang, S., Zhang, X., and Zhang K., “Data Hiding in Digital Audio by Frequency Domain Dithering,”LNCS 2776, Springer-Verlag Berlin Heidelberg, pp. 383-394, 2003.
[35]Wu, S., Huang, J., Huang, D., and Shi, Y. Q., “Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission,”IEEE Transactions on Broadcasting, Vol. 51, No. 1, pp. 69-76, Mar. 2005.
[36]Noll, P., “Wideband speech and audio coding,” IEEE communications Magazine, Vol. 31, No.11, pp. 34-44, 1993.
[37]Zhang, X. and Wang, S., “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, pp. 331-334, 2004.
[38]Wu, H. C., Wu, N. I., Tsai, C. S., and Hwang, M. S., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings Vision, Image & Signal Processing, Vol. 152, No. 5, pp. 611-615, Oct. 2005.