Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proc. IEEE Carnahan Conf. on Crime Countermeasures, May 1979, pp. 101-109.* |
Wagner, “Fingerprinting,” Proc. IEEE Symp. on Security and Privacy, Apr. 1983, pp. 18-22.* |
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science and Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.* |
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns, ” Electronics and Communications in Japan, Part I, vol. 72, No. 4, 1989, pp. 50-56.* |
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part I, vol. 73, No. 5, 1990, pp. 22-33.* |
Tanaka et al., “Embedding the Attribute Information into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50.* |
Van Schyndel et al., “A Digital Watermark,” Proc. IEEE Int. Conf. on Image Processing, vol. 2, Nov. 1994, pp. 86-90.* |
Koch et al., “Towards Robust and Hidden Image Copyright Labeling,” Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 1995, pp. 452-455.* |
Bruyndonckx et al., “Spatial Method for Copyright Labeling of Digital Images,” Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 1995, pp. 456-459.* |
Pitas et al., “Applying Signatures on Digital Images,” Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 1995, pp. 460-463.* |
Craver et al., “Can Invisible Watermarks Resolve Rightful Ownerships?” IBM Research Report RC20509, Jul. 1996, 21 pages.* |
Swanson et al., “Robust Data Hiding for Images,” Proc. IEEE Digital Signal Processing Workshop, Sep. 1996, pp. 37-40.* |
Pitas, “A Method for Signature Casting on Digital Images,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 215-218.* |
Wolfgang et al., “A Watermark for Digital Images,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 219-222.* |
Hsu et al., “Hidden Signatures in Images,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 223-226.* |
Schneider et al., “A Robust Content Based Digital Signature for Image Authentication,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 227-230.* |
Bors et al., “Image Watermarking using DCT Domain Constraints,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 231-234.* |
Ó Ruanaidh et al., “Phase Watermarking of Digital Images,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp 239-242.* |
Cox et al., “Secure Spread Spectrum Watermarking for Images, Audio and Video,” Proc. IEEE Int. Conf. on Image Proccessing, vol. 3, Sep. 1996, pp. 243-246.* |
Kinoshita, “An Image Digital Signature System withZKIP for the Graph Isomorphism,” Proc. IEEE Int. Conf. on Image Processing, vol. 3, Sep. 1996, pp. 247-250. |