BYTE Magazine, “How to Embed a Watermark”, Jan. 1997, 1 page (http://www.byte.com/art/970/sec18/art3.htm). |
Ahumada, Jr., “Luminance-Model-Based DCT Quantization for Color Image Compression”, SPIE Human Vision, Visual Processing, and Digital Display III, 1992, 1666, 365-374. |
Friedman, G.L., “The trustworthy Digital Camera: Restoring Credibility to the Photographic Image”, IEEE Trans. on Consumer Electronics, Nov. 1993, 39(4), 905-910. |
Kesavan, H., “EE 392c Autumn 1997 Final Project: Choosing a DCT Quantization Matrix for JPEG Encoding”, http://www-ise.stanford.edu/class/ee392c/demos/kesavan, Jul. 1998, 5 pages. |
Koch, E. et al., “Towards Robust and Hidden Image Copyright Labeling”, IEEE Workshop on Nonlinear Signal and Image Processing, 1995, 1-4. |
Mintzer, F. et al., “Effective and Ineffective Digital Watermarks”, ICIP, 1997, vol. 3, 4 pages. |
Richter, J., “The Digital Watermark”, http://www.richterscale.org/pcgr/pc960220.htm, May 1998, 3 pages. |
Schneidner, M. et al., “A Robust Content Based Digital Signature for Image Authentication”, IEEE, 1996, 227-230. |
Storck, D., “A New Approach to Integrity of Digital Images”, IFIP Conf. on Mobile Communication, 1996, 8 pages. |
Swanson, M.D. et al., “Robust Data Hiding for Images”, IEEE Digital Signal Processing Workshop, Sep. 1996, 37-40. |
Wallace, G.K., “The JPEG Still Picture Compression Standard”, IEEE Trans. on Consumer Electronics, 1991, 1-17. |
Yeung, M.M. et al., “An Invisible Watermarking Technique for Image Verification”, ICIP, 1997, vol. 2, 4 pages, |
Zeng, W, et al., “On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks”, ICIP, 1997, 4 pages. |
Zhao, J., “Digital watermarking is the best way to protect intellectual property from illicit copying”, (http://www.byte.com/art/9701/sec18/art1.htm), May 1998, 5 pages. |