Bender et al. “Techniques for Data Hiding” SPIE Proceedings vol. 2420 p. 167-73, 1995.* |
Bender et al. “Techniques for Data Hiding” IBM Systems Journal vol. 38 p. 313-36, 1996.* |
“A Note on Protecting Illegal Copies for Image Data,” Nishimura, et al, Institute of Electronics Information and Communication Engineers, (1994), vol. 94, No. 295 (IT94 63-70) p. 33-39. |
“Embedding a Signature to Pictures by Wevelet Transformation,” Martsui, et al., Institute of Electronics, Information and Communication Engineers D-II, vol. J79D-II, No. 6, p. 1017-24. |
“A Secure, Robust Watermark for Multimedia,”Cox, et al., Workshop on Information Hiding, Newton Institute, University of Cambridge, May 1996. |
“A WWW Service To Embed and Prove Digital Copyright Watermarks,” Zhao, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, May 1996. |
Nikkei Electronics Apr. 22, 1996 (No. 660), p. 13. |
A. Borg, et al.,(1996)“Embedding Parametric Digital Signatures In Images”,Proceedings of Eusipco, vol. 3, 10-13, pp. 1701-1704. |
E. Koch, et al.,(1995)“Embedding Robust Labels Into Images For Copyright Protection”, Conference Proceedings of the Knowright Conference, Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technology, pp. 242-251. |