Electronic marking and identification techniques to discourage document copying, IEEE INFOCOM'94 -Networking for global communications, 1994. ,
Watermarking digital images for copyright protection, Fifth International Conference on Image Processing and its Applications, pp.326-330, 1995. ,
DOI : 10.1049/cp:19950674
Collusion-secure fingerprinting for digital data, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pp.452-564, 1995. ,
Protecting publicly-available images with a visible image watermark, 1996. ,
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, 1995. ,
DOI : 10.1109/83.650120
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Authentication and authenticated key exchanges. Designs, Codes and Cryptography, pp.107-125, 1992. ,
Spread Spectrum with Commercial Applications, 1994. ,
The history of cryptography, Information Hiding, number 1174 in Lecture Notes in Computer Science, pp.1-5, 1996. ,
Towards robust and hidden image copyright labeling, Proe of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995. ,
Finite Fields. Number 20 in Encyclopedia of Mathematics and its Applications, 1983. ,
Video-Stenography: How to embed a Signature in a Picture, IMA Intellectual Property Proceedings, pp.187-205, 1994. ,
The self shrinking generator, Communications and Cryptography: Two sides of One Tapestry, pp.287-295, 1994. ,
Asymmetric Fingerprinting, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pp.84-95, 1996. ,
DOI : 10.1007/3-540-68339-9_8
Towards a robust digital watermark, ACCV'95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pp.504-508, 1995. ,
Techniques for data hiding, Proceedings of the SPIE, 1995. ,
Embedding robust labels into images for copyright protection, pp.242-251, 1995. ,