1. Maillard, T., Furon, T.: Towards digital rights and exemptions management systems. Computer Law and Security Report 20, 281–287 (2004)
2. Craver, S., Memon, N., Yeo, B.L., Yeung, M.: Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal of selected areas in communications 16, 573–587 (1998); Special issue on copyright and privacy protection
3. Bloom, J., Cox, I., Kalker, T., Linnartz, J.P., Miller, M., Traw, C.: Copy protection for DVD video. Proc. of the IEEE 87, 1267–1276 (1999); Special issue on identification and protection of multimedia information
4. Stern, J., Craver, S.: Lessons learned from the SDMI. In: Dugelay, J.L., Rose, K. (eds.) Proc. of the Fourth Workshop on Multimedia Signal Processing (MMSP), Cannes, France, pp. 213–218. IEEE, Los Alamitos (2001)
5. Cox, I., Miller, M.: Electronic watermarking: The first 50 years. In: Dugelay, J.L., Rose, K. (eds.) Proc. of Fourth Workshop on Multimedia Signal Processing (MMSP), Cannes, France, pp. 225–230. IEEE, Los Alamitos (2001)