Pieprzyk, “Fingerptints for Copyright Software Protection,” 1999, ISW'99, LNCS 1729, pp. 178-190.* |
Tomboulian, “Overview and Extensions of a System for Routing Directed Graphs on SIMD Architectures” 1988, IEEE, pp. 63-67.* |
Ohbuchi et al., “Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modification,” IEEE, 1999, pp. 551-560.* |
Su et al., “Blind digital watermarking for cartoon and map images,” Proc. SPIE vol. 3657: Security and Watermarking of Multimedia Contents, Jan. 25-27, 1999, pp. 296-306.* |
Ohbuchi et al., “Watermarking Three-Dimensional Polygonal Models,” Proc. 5th ACM International Conference Multimedia, Nov. 9-13, 1997, pp. 261-272.* |
Yeo et al., “Watermarking 3D Objects for Verification,” IEEE, Jan./Feb. 1999, pp. 36-45.* |
Benedens, “Geometry-Based Watermarking of 3D Models,” IEEE, Jan./Feb. 1999, pp. 46-55.* |
Joe Kilian, F. Thomson Leighton, Lesley R. Matheson, Talal G. Shamoon, Robert E. Tarjan, Francis Zane, “Resistance of Digital Watermarks to Collusive Attacks”, Princeton Computer Science Technical Report TR-585-98, 1998, pp. 1. |
Emil Praun, Hugues Hoppe and Adam Finkelstein, “Robust Mesh Watermarking”, Princeton Computer Science Technical Report TR-593-99, 1999, pp. 1-21. |
Joe Kilian, F. Thomson Leighton, Lesley R. Matheson, Talal G. Shamoon, Robert E. Tarjan and Francis Zane, “Resistance of Digital Watermarks to Collusive Attacks”, ISIT 1998, Cambridge MA, USA, Aug. 16-Aug. 21. |
Ingemar J. Cox, Joe Kilian, F. Thomson Leighton and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, vol. 6, No. 12, pp. 1673-1687, Dec. 1997. |
Dan Boneh and James Shaw, “Collusion-Secure Fingerprinting for Digital Data”, IEEE Transactions on Information Theory, vol. 44, No. 5, pp. 1897-1905, Sep. 1998. |
Andrew B. Kahng, Stefanus Mantik, Igor L. Markov, Miodrag Potkonjak, Paul Tucker, Huijuan Wang and Gregory Wolfe, “Robust IP Watermarking Methodologies for Physical Design”, In Proceedings of the 35th Design Automation Conference Proceedings, pp. 782-787, San Francisco, CA, Jun. 1998. |
Neal R. Wagner, “Fingerprinting”, In Procedings of the 1983 IEEE Symposium on Security and Privacy, pp. 18-22, Apr. 1993. |
A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker, H. Wang and G. Wolfe, “Watermarking Techniques for Intellectual Property Protection”, In Proceedings of the 35th Annual Design Automation Conference, pp. 776-781, San Francisco, CA, Jun. 1998. |
Gang Qu and Miodrag Potkonjak, “Analysis of Watermarking Techniques for Graph Coloring Problem”, International Conference on Computer Aided Design, San Jose, California, ACM 1998, pp. 190-193. |
Arlindo L. Oliveira, “Robust Techniques for Watermarking Sequential Circuit Designs”, In Proceedings of the 36th Annual Design Automation Conference, pp. 837-842, New Orleans, LA, Jun. 1999. |