Gabor, et al., “Theory of Communication,” J. Inst. Elect. Eng. 93, 1946, pp. 429-441. |
Roberts, “Picture Coding Using Pseudorandom Noise,”IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1992, pp. 145-154. |
Jain, “Image Coding Via a Nearest Neighbors Image Model,” IEEE Transactions on Communications, vol. COM-23, No. 3, Mar. 1975, pp. 318-331. |
Szepanski, “Optimization of Add-On Signals by Means of a Modified Training Algorithm for Linear Classifiers,” IEEE Int'l Symp. On Info. Theory, Oct. 10, 1997, pp. 27-28. |
Szepanski, “Binary Data Transmission Over Video Channels with Very Low Amplitude Data Signals,” Fernseh-und Kino-Technik, vol.32, No.7, Jul., 1978, pp. 251-256. (German Text with full English translation.) |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16 1979, pp. 101-109. |
Pickholtz et al., “Theory of Spread-Spectrum Communications—A Tutorial,” Transactions on Communications, vol. COM-30, No. 5, May, 1982, pp. 855-884. |
Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22. |
Sklar, “A Structured Overview of Digital Communications—a Tutorial Review—Part I,” IEEE Communications Magazine, Aug., 1983, pp. 1-17. |
Sklar, “A Structured Overview of Digital Communications—a Tutorial Review—Part II,” IEEE Communications Magazine, Oct., 1983, pp. 6-21. |
Sheng et al., “Experiments On Pattern Recognition Using Invariant Fourier-Mellin Descriptors,” Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776. |
Castro et al., “Registration of Translated and Rotated Images Using Finite Fourier Transforms,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703. |
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56. |
Kassam, Signal Detection in Non-Gaussian Noise, Dowden & Culver, 1988, pp. 1-96. |
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 23-33. |
Nakamura et al., “A Unified Coding Method of Image and Text Data Uisng Discrete Orthogonal Transform,” Systems and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92. |
Tanaka, “Embedding the Attribute Information Into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50. |
Arazi, et al., “Intuition, Perception, and Secure Communication,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016-1020. |
Schreiber et al., “A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information,” SMPTE Journal, Dec. 1989, pp. 873-879. |
Tanaka et al., “New Integrated Coding Schemes for Computer-Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281. |
Tanaka et al., “Embedding Secret Information Into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220. |
Tanaka et al., “A Visual Retrieval System with Private Information for Image Database,” International Conference on DSP Applications and Technology, Oct. 1991, pp. 415-421. |
Szepanski, “Compatibility Problems in Add-on Data Transmission for TV-Channels,” 2nd Symp. and Tech. Exh. on Electromagnetic Compatibility, Jun. 1977, pp. 263-268. |
Szepanski, Additive binary Data Transmission for Video Signals, Conference of the Communications Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text and English translation enclosed). |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proc. 1979 Carnahan Conf. on Crime Countermeasures, Univ. of Kentucky, Lexington, KY, May 16-18, 1979, pp. 101-109.* |
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56.* |
Wagner, “Fingerprinting,” IEEE, 1983, pp. 18-22.* |
Tanaka et al., “Embedding the Attribute Information into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50.* |
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science and Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.* |
Komatsu et al., “A Proposal on Digital Watermarking in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 23-23. |