J. , S. Low, N. Maxemchuck, and L. O. Gorman, Electronic marking and identification techniques to discourage document copying, IEEE INFOCOM'94 -Networking for global communications, 1994.

F. M. Boland, J. J. O-'ruanaidh, and C. Dautzenberg, Watermarking digital images for copyright protection, Fifth International Conference on Image Processing and its Applications, pp.326-330, 1995.
DOI : 10.1049/cp:19950674

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pp.452-564, 1995.

G. W. Braudaway, K. A. Magerlein, and F. Mintzer, Protecting publicly-available images with a visible image watermark, 1996.

I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, 1995.
DOI : 10.1109/83.650120

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

W. Diffie, P. C. Van-oorshot, and M. J. Wiener, Authentication and authenticated key exchanges. Designs, Codes and Cryptography, pp.107-125, 1992.

R. C. Dixon, Spread Spectrum with Commercial Applications, 1994.

D. Kahn, The history of cryptography, Information Hiding, number 1174 in Lecture Notes in Computer Science, pp.1-5, 1996.

E. Koch and J. Zhao, Towards robust and hidden image copyright labeling, Proe of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995.

R. Lidl and H. Niederreiter, Finite Fields. Number 20 in Encyclopedia of Mathematics and its Applications, 1983.

K. Matsui and K. Tanaka, Video-Stenography: How to embed a Signature in a Picture, IMA Intellectual Property Proceedings, pp.187-205, 1994.

W. Meier and O. Staffelbach, The self shrinking generator, Communications and Cryptography: Two sides of One Tapestry, pp.287-295, 1994.

B. Pfitsmann and M. Schunter, Asymmetric Fingerprinting, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pp.84-95, 1996.
DOI : 10.1007/3-540-68339-9_8

R. G. Van-schyndel, A. Z. Tirkel, and C. F. Osborne, Towards a robust digital watermark, ACCV'95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pp.504-508, 1995.

N. Morimo, W. Bender, and D. , Techniques for data hiding, Proceedings of the SPIE, 1995.

J. Zhao and E. Koch, Embedding robust labels into images for copyright protection, pp.242-251, 1995.