参考文献
[l] A.K.Jain,R.M.Bolle and S.panLkanti,Eds.,Biometries:personal identifieation in a networked soeiety,Norwell,MA:Kluwer,1999.
[2] Y.Linde,A.Buzo,andR.M.Gr,An Algorithm for Veetor Quantizer Design,IEEE Transaetions on Communieations,January 1980,PP.702一710.
[3] Henrique s M,Dinei A F F,Improved Spread spectrum:a new modulation teehnique for robust watermarking,IEEE Transaetions www.51lunwen.org/szmtlw/ on Signal Proeessing,2003,51(4),PP.898一895.
[4]YU Yin-yin,TANGZhi,A Survey of the Research on DigitalRights Management,Chinese Journal of ComPuters,2005,28(12),PP.1957一1968.
[5]MierosoftDRM.=2004一06].
[6]Inter Tnlst DRM.[2004一06].
[7]IBM'sEMMS.[2002一02一Zl].
[8] Mandal,p,Thal,A,Verma,S,Watermark based digital rights management,Proeeeding of the ITCC2005,LasVegas,Nevada,2005,1,PP.74一78.
[9]AdobeConientServer.[2006一10一1].
[10]PfitzmanAed,Informationhiding,LNCS1768,Berlin:SpringerVerlag,1999