W. Bender, “Techniques for Data Hiding”, IBM Systems Journal, vol. 35, No. 3 & 4, 1996, pp. 313-336. |
E. Okamoto, Ango Riron Nyumon (Introduction to Cryptography), Kyoritsu Shuppan Co., Ltd., 1993, pp. 133-137. |
B. Schneier, Applied Cryptography, 2nd Ed., John Wilsy & Sons, Inc., 1996, pp. 39-41. |
Nikkei Electronics, N. 683, 1997, pp. 99-107. |
Opendesign, Apr. 1996, pp. 4-22. |
Opendesign, Apr. 1996, pp. 40-78. |
Jyohoshori (Information Processing), Jyohoshori Gakk ai (Information Processing Society of Japan), vol. 38, No. 9, 1997, pp. 752-810. |
N. Komatsu, et al, A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature, Electronics and Communication in Japan 73(1990) May, No. 5, Part 1, New York, US, pp. 22-33. |
B. Schneier, Applied Cryptography, 1996, John Wiley & Sons, US. New York, pp. 39-41. |
Sasaki, et al, Security Technology for Open Networks, Hitachi Review, JP, Hitachi, Ltd., Tokyo vol. 46, No. 4, pp. 197-202. |
M. Schneider et al, A Robust Content Based Digital Signature for Image Authentication, Proceedings of the International conference on Image Processing, US, New Yori, IEEE, pp. 227-230. |
F. Rouaix, “A Web Navigator with Applets in Caml”, 1996, Published by Elsevier Science B.V., Computer Networks and ISDN System 28, pp. 1365-1371. |
S. Anderson, et al, “Sessioner: Flexible Session Level Authentication with off the shelf servers and clients”, 1995 Elsevier Science B.V., Computer Networks and ISDN Systems 27, pp. 1047-1053. |