1. M. Kutter, F. Jordan, V. Bossen: Journal of Electronic Imaging, Vol. 7 (1998) No. 2, p.326.
2. N. Johnson, Z. Duric, S. Jajodia: Lecture Notes in Computer Science, Vol. 1768 (1999), p.318.
3. P. Dong, J. Brankov, N. Galatsanos, Yongyi Yang: Proceeding of IEEE Intnational Cenference of Image Processing(Chicago, USA, June 24-28, 2002). Vol. 3, p.493.
4. J. Lichtenauer, I. Setyawan, R.L. Lagendijk: Proceeding of Security, Steganography and Watermarking of Multimedia Contents VI(San Jose, USA, January 18, 2004). Vol. 5306, p.320.
5. O. Ruanaidh, T. Pun: Signal Processing, Vol. 66(1998) No. 3, p.303.