1. Cox, I.J., et al. 1996. A secure, robust watermark for multimedia. In Information hiding. Springer.
2. Tamada, H., et al. 2004. Design and evaluation of birthmarks for detecting theft of java programs. In IASTED conference on software engineering.
3. Samson, P.R. 1994. Apparatus and method for serializing and validating copies of computer software. Google Patents.
4. Moskowitz, S.A. and M. Cooperman. 1998. Method for stega-cipher protection of computer code. Google Patents.
5. Grover, D. 1992. Protection of computer software: Its technology and application. Cambridge University Press.