Zhao, J., “A WWW Service to Embed and Prove Digital Copyright Watermarks,” Proc. European Conf. on Multimedia Applications, Services and Techniques (ECMAST'96), May 1996, pp. 695-710.* |
Hartung, F. et al., “Watermarking of MPEG-2 encoded video without decoding and re-encoding,” Proc. SPIE vol. 3020: Multimedia Computing and Networking 97, Feb. 1997, pp. 264-274.* |
Hartung, F. et al., “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain,” Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Apr. 1997, pp. 2621-2624.* |
Hartung, F. et al., “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, May 1998, pp. 283-301.* |
Zhao, J., “Applying Digital Watermarking Techniques to Online Multimedia Commerce,” Proc. Int. Conf. on Imaging Science, Systems, and Applications (CISSA'97), Jun./Jul. 1997, 7 pages.* |
Muranoi, R. et al., “Video Retrieval Method using ShotID for Copyright Protection Systems,” Proc. SPIE vol. 3527: Multimedia Storage and Archiving Systems III, Nov. 1998, pp 245-252.* |
Digimarc® Watermarking Guide, ©1999 Digimarc Corporation, 22 pages.* |
Dittmann, J. et al., “Combining digital Watermarks and collusion secure Fingerprints for digital Images,” Proc. SPIE vol. 3657: Security and Watermarking of Multimedia Contents, Jan. 1999, pp. 171-182.* |
Kalker, T., “System Issues in Digital Image and Video Watermarking for Copy Protection,” Proc. IEEE Int. Conf. on Multimedia Computing and Systems, Jun. 1999, pp. 562-567.* |
Adelsbach, A. et al., “Proving Ownership of Digital Content,” Proc. 3rd Int. Workshop on Information Hiding, LNCS vol. 1768, Sep./Oct. 1999, pp. 117-133.* |
Guth, H.-J. et al., “Error- and Collusion-Secure Fingerprinting for Digital Data,” Proc. 3rd Int. Workshop on Information Hiding, LNCS vol. 1768, Sep./Oct. 1999, pp. 134-145.* |
Lin, P.-L., “Robust transparent image watermarking system with spatial mechanisms,” The Journal of Systems and Software, vol. 50, Feb. 2000, pp. 107-116.* |
Dittmann, J., “Combinting digital Watermarks and collusion secure Fingerprints for customer copy monitoring,” Proc. IEE Seminar on Secure Images and Image Authentication, Apr. 2000, pp. 6/1-6/6. |