1. Lect Notes Comput Sci;R.J. Anderson,1996
2. Lect Notes Comput Sci,1996
3. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum water-marking for multimedia. Technical Report Technical Report 95-10, NEC Research Institute, 1995.
4. S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung. On the invertibility of invisible watermarking techniques. submitted to International Conference on Image Processing 1997, 1997.
5. David Kahn. The history of steganography. In Anderson [2], pages 1–5.