Elizabeth Corcoran, In Hot Pursuit of Software Pirates, Washington, Post, Aug. 23, 1995, at F1. |
N. Komatsu and H. Tominaga, A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature, Electronics and Communication in Japan, Part 1 (Communications), vol. 73, No. 5, 1990, at 22-23. |
K. Matsui and K. Tanaka, Video-Steganography: How to Secretly Embed a Signature in a Picture, Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, Jan. 1994, at 187-206. |
Michael Lesk, How Can Digital Information Be Protected, Research Challenges in the Economics of Information, CNRS, Jul. 1993. |
J.T. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, Marking of Documents Images with Code-Words to Deter Illicit Dissemination, Proc. INFOCOM 94 Conference on Cumputer Communications, 194, at 1278-87. |
Steve Lohr, Pirates are Circling The Good Ship Windows 95, New York Times, Aug. 24, 1995, at D6. |