| Brassil et al., "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 12, No. 8, Oct. 1995, pp. 1495-1504. |
| D.S. Bloomberg, "Multiresolution morphological analysis of document images", SPIE Conf. 1818, Visual Communications and Image Processing '92, Boston, MA, Nov. 1992, pp. 648-662. |
| Mark Peairs, "Iconic Paper", Proccedings of the International Conference on Document Analysis and Recognition, Montreal, Canada, Sep. 1995, pp. 1174-1179. |
| Kermit Norris, "Channel Capacity of Charge-Constrained Run-Length Limited Codes", IEEE Transactions on Magnetics, vol. Mag. 17, No. 6, Nov. 1981, pp. 3452-3455. |
| Story et al., "The RightPages Image-Based Electronic Library for Alerting and Browsing", IEEE Computer, Sep. 1992, pp. 17-26. |
| Susan Weixel, Word 6 for Windows Quickstart, Que Corporation, Indianapolis, IN, 1994, pp. 47-48, 154-155. |
| Digimarc Corporation, url: www.digimarc.com; Digimarc Announcement, dated Jun. 27, 1995, and Frequently Asked Questions, available and printed form World Wide Web site during Aug., 1996. |
| Stallings, W., Network and Internetwork Security Principles and Practice, Prentic Hall, Englewood Cliffs, N.J., 1995, Section 2.2., Classical Encryption Techniques, pp. 27-28. |
| O'Gorman, L. and Rabinovich, I., "A Pattern Recognition Approach to Photo-ID Authentication", International Conference on Pattern Recognition (ICPR '96), Vienna, Austria, Aug. 1996, (page numbers unavailable). |
| M. Mansour, "Multi-Tiered Condensed Bar Code", IBM Technical Disclosure Bulletin, vol. 26, No. 2, Jul. 1983, pp. 766-767. |