1. A. Adelsbach, U. Huber, A.-R. Sadeghi, Fingercasting – joint fingerprinting and decryption of broadcast messages, in: Proceedings of 11th Australasian Conference Information Security Privacy, vol. 4058, 2006, pp. 136–147.
2. Discrete cosine transform;Ahmed;IEEE Trans. Comput.,1974
3. M. Ammar, P. Judge, WHIM: watermarking multicast video with a hierarchy of intermediaries, in: Proceedings of 10th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV ’00), Chapel Hill, USA, 2000.
4. Real-time symmetric cryptography using quaternion Julia set;Anand;Int. J. Comput. Sci. Network Secur. (IJCSNS),2009
5. Chameleon - a new kind of stream cipher;Anderson,1997