[1]Lee S.J. and Jung S.H., “A Survey of Watermarking Techniques Applied to Multimedia”, Proceedings of IEEE International Symposium on Industrial Electronics vol. 1, pp. 272-277, 2001.
[2]蕭人豪、林欣慧、林金龍、林麗虹,"數位浮水印技術發展現況:以數位典藏計畫為例",中央研究院資訊科學研究所,2005.
[3]Stefan Katzenbeisser, Fabien A.P. Petitcolas,Information hiding techniques for steganography and digital watermarking, Boston : Artech House, 2000.
[4]Chang C. S. , Shen J. J. , Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques[J]. IEEE Transactions on Image Processing, A Publication of the IEEE Signal Processing Society, 2017:1-1. DOI:10.1109/TIP.2017.2706502
[5]Dixit, A. and R. Dixit. "A Review on Digital Image Watermarking Techniques." International Journal of Image, Graphics and Signal Processing 9.4(2017):56-66. DOI:10.5815/ijigsp.2017.04.07
[6]Nguyen-Thanh, T. , and T. Le-Tien. "Study on Improved Cooperative Spread Spectrum Based Robust Blind Image Watermarking." (2020), January 2020. DOI:10.12720/jait.11.3.119-127
[7]M. R. M. Isa and S. Aljareh, “Biometric image protection based on discrete cosine transform watermarking technique,” in Proc. Int. Conf. Eng. Technol., Cairo, Egypt, Oct. 2012, pp. 1–5.
[8]王旭正、翁麒耀、林佳禎等著,數位影像處理與應用,博碩圖書出版社,2016.
[9]徐曉珮譯,劉震昌審譯 (原著:Alasdair McAndrew : Introduction to Digital Image Processing with MATLAB),數位影像處理,高立圖書出版社,2018.
[10]陳同孝、張真誠、黃國峰等著,數位影像處理技術,旗標出版股份有限公司,2016.
[11]趙元甫,資料隱藏技術之研究,國立中央大學碩士論文,1999.