Szepanski, W., “A Signal Teoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” IEEE Proc. 1979 Carnahan Conf. on Crime Countermeasures, May 1979, pp. 101-109.* |
Matthews, R., “When Seeing is not Believing,” New Scientist, No. 1895, Oct. 16, 1993, pp. 13-15.* |
Friedman, G. L., “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Trans. Consumer Electronics, vol. 39, No. 4, Nov. 1993, pp. 905-910.* |
Walton, S., “Image Authentication for a Slippery New Age,” Dr. Dobb's Journal, Apr. 1995, pp. 18-20, 22, 24, 26, 82 and 84-87.* |
Schneider, M., “A Robust Content Based Digital Signature for Image Authentication, ” IEEE Proc. Int. Conf. on Image Processing, Sep. 1996, pp. 227-230 (vol. 3).* |
Lin, C.-Y. et al., “Generating Robust Digital Signature for Image/Video Authentication,” Proc. Multimedia and Security Workshop at ACM Multimedia'98, Sep. 1998, pp. 49-54.* |
Dittmann, J., “Chapter 3: Telltale Watermarking,” in Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals, Ph.D. thesis at Univ. of Toronto, 1999, pp. 23-52.* |
Lin, C.-Y. et al., “Issues and Solutions for Authenticating MPEG Video,” Proc. SPIE vol. 3657: Security and Watermarking of Multimedia Contents, Jan. 1999, pp. 54-65.* |
Xie, L. et al., “Secure MPEG Video Communications by Watermarking,” Proc. Conf. of ATIRP (Advanced Telecommunications and Information Distribution Research Project), Feb. 1999, pp. 459-462.* |
Dittmann, J. et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE Proc. Int. Conf. on Multimedia Computing and Systems, Jun. 1999, pp. 209-213.* |
Lamy, P. et al., “Content-Based Watermarking for Image Authentication,” Proc. 3rdInt. Workshop on Information Hiding, Sep./Oct. 1999, pp. 187-198.* |
Queluz, M. P. et al., “Spatial Watermark for Image Verification,” Proc. SPIE vol. 3971: Security and Watermarking of Multimedia Contents II, Jan. 2000, pp. 120-130.* |
Sun, Q. et al., “VQ-based digital signature scheme for multimedia content authentication,” Proc. SPIE vol. 3971: Security and Watermarking of Multimedia Contents II, Jan. 2000, pp. 404-416.* |
Xie, L. et al., “Methods for Soft Image/Video Authentication,” Proc. Conf. of ATIRP (Advanced Telecommunications and Information Distribution Research Project), Mar. 2000, 5 pages.* |
Rey, C. et al., “Blind Detection of Malicious Alterations on Still Images using Robust Watermarks,” Proc. IEE Seminar on Secure Images and Image Authentication, Apr. 2000, pp. 7/1-7/6.* |
Bassali et al., “Compression Tolerant Watermarking for Image Verification,” IEEE Proc. Int. Conf. on Image Processing, vol. 1, Sep. 2000 pp. 434-437. |
Frequently Asked Questions, Epson Image Authentication System (IAS), Oct. 5, 1999, 3 pages. |
U.S. Provisional application No. 60/180,364, Davis et al., filed Feb. 4, 2000. |
U.S. Provisional application No. 60/198,138, Alattar, filed Apr. 17, 2000. |
U.S. Provisional application No. 60/198,857, Davis et al., filed Apr. 21, 2000. |
U.S. patent application No. 09/198,022, Rhoads, filed Nov. 23, 1998. |
U.S. patent application No. 09/525,865, Davis et al., Mar. 15, 2000. |
U.S. patent application No. 09/625,577, Carr et al., Jul. 25, 2000. |
U.S. patent application No. 09/645,779, Tian et al., filed Aug. 24, 2000. |