“Unauthorized Copy Prevention.” IBM Technical Disclosure Bulletin, pp. 59-60, Jun. 1975.* |
“Document Security System for Copy Machines.” IBM Technical Disclosure Bulletin, pp. 3550-3551, Jan. 1981.* |
Hara et al. “An Improved Method of Embedding Data Into Pictures by Modulo Masking.” IEEE Trans. on Communications, vol. 36, No. 3, pp. 315-331, Mar. 1988.* |
Tanaka et al. “Embedding Secret Information into a Dithered Multi-Level Image.” Milcom '90, IEEE, vol. 1, pp. 216-220, Sep. 1990.* |
Komatsu et al. “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature.” IEICE Transactions, vol. J2-B-I, No. 3, 1989, pp. 208-218.* |
Komatsu et al. “Authentication System Using Concealed Image in Telematics.” Memoirs of the Schoold of Science and Engineering, Waseda University, No. 52, pp. 45-60, 1988.* |
Komatsu et al. “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature.” Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990 (translation, pp. 22-33).* |
Yasuhiro Nakamura & Kineo Matusi, “A Unified Coding Method of Image and Text Data Using Three-Level Micro-Patterns,” Gazou Densi Gakkaishi vol. 17, No. 1 (1988) pp. 3-9. |
Naohisa Komatsu, “Information Security For Facsimile Communication”; Gazo Denshi Gakkkaishi (Journal of the Institute of Picture and Electronics Engineers) vol. 19, No. 4, April 1990, pp. 229-235 and translation (pp. 1-12). |
Costaa S. Xydes et al, “Embedding Data Into Pictures By Modulo Masking”, IEEE Transactions on Communications, vol. COM-32, No. 1 January 1984, pp. 56-70. |
Michio Yamada et al., “A Proposal on Secure Document Image Management Facilities Using Smart Card″,” Proc. of 1989 Autumn Meeting of the Institute of Electronics, Information and Communication Engineers, SD-2-3, September 1989, pp. 223-224 and translation (3 pgs). |