1. W. Bender, D. Gruhl, N. Morimoto, Techniques for data hiding, Tech. Rep., MIT Media Lab, 1994.
2. O. Bruyndonckx, J.-J. Quisquater, B. Macq, Spatial method for copyright labeling of digital images, Proc. 1995 IEEE Nonlinear Signal Processing Workshop, Thessaloniki, Greece, 1995, pp. 456–459.
3. I. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, Tech. Rep. 95-10, NEC Research Institute, 1995.
4. S. Craver, N. Memon, B.-L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? IBM Research Technical Report RC 20509, IBM Cyber Journal, July 1996.
5. S. Craver, N. Memon, B.-L. Yeo, M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IBM Research Technical Report RC 20755, IBM Cyber Journal, March 1997.