1. N.R. Wagner, “Fingerprinting,” Proceedings of IEEE Symposium on Security and Privacy, pp. 18–22, 1983.
2. D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data,” IEEE Transactions on Information Theory, Vol. 44, September 1998, pp. 1897–1905.
3. A. Barg, G.R. Blakley, and G.A. Kabatiansky, “Digital Fingerprinting Codes: Problem Statements, Constructions, Identification of Traitors,” IEEE Transactions on Information Theory, Vol. 49, April 2003, pp. 852–865.
4. W. Luh and D. Kundur, “Digital Media Fingerprinting: Techniques and Trends,” in B. Furht and D. Kirovski, (Eds.) “Handbook of Multimedia Security,” CRC Press, Florida, 2004, pp. 567–594.
5. G. Tardos, “Optimal Probabilistic Fingerprint Codes,” Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pp. 116–125, 2003.