1. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute (1995)
2. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships With Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection (April 1998) (IBM Research Report, RC 20755, March 1997)
3. Hachez, G., Quisquater, J.-J.: Which directions for asymmetric watermarking? In: Proceedings of EUSIPCO (Toulouse, France (September 2002)
4. Craver, S., Katzenbeisser, S.: Security Analysis of Public-Key Watermarking Schemes. In: Proceedings of SPIE, Mathematics of Data/Image Coding, Compression and Encryption IV, July 2001, vol. 4475, pp. 172–182 (2001)
5. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)