Haitsma et al., Audio Watermarking for Monitoring and Copy Protection, ACM Multimedia Workshop, 2000, pp. 119-122. |
Schreiber et al., “A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information,” SMPTE Journal, Dec. 1989, pp. 873-878. |
Swanson et al., “Data Hiding for Video-in-Video,” 1997 IEEE, pp. 676-679. |
Tewfik, Data Embedding Imagery and Its Applications, AFRL Presentation, Jul. 1998. |
Tewfik, “Data Embedding in Imagery,” ARFL Presentation, Feb. 1999. |
Zhu et al., “Image Coding by Folding,” Proc. Intl. Conf. on Image Processing, vol. 2, pp. 665-668, Oct. 1997. |
Secure Hash Standard, Federal Information Processing Standards Publication, U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, (Apr. 1995). |
Goldwasser, S., et al., “Lecture Notes on Cryptography”, http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html, (Jul. 1996). |
Lin, S., et al., Error Control Coding: Fundamentals and Applications, Table of Contents, (1983). |
Quatieri, T.F., et al., “Speech Transformations Based on a Sinusoidal Representation”, IEEE Transactions on Acoustics, Speech, and Signal Processing, pp. 1449-1464, (Dec. 1986). |
Rivest, R.L., “Cryptography”, In: Handbook of Theoretical Computer Sciences, vol. A, Ch. 13, Van Leeuwen, J., (ed.), pp. 717-755, (1990). |
Rivest, R.L., “The MD4 MEssage Digest Algorithm”, Advances in Cryptology—CRYPTO '90, pp. 303-311, (1991). |
Thompson, D.J., “Spectrum Estimation and Harmonic Analysis”, Proceeding's of the IEEE, 70 (9), pp. 1055-1096, (Sep. 1982). |