1. A. Adelsbach, S. Katzenbeisser, A. Sadeghi, Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure, in: Proceedings of the European Signal Processing Conference, Toulouse, France, 2002.
2. P. Bas, B. Macq, A new video-object watermarking scheme robust to object manipulation, in: Proceedings of the International Conference on Image Processing, IEEE, Thessaloniki, Greece, 2001.
3. J. Bloom, I.J. Cox, T. Kalker, J.-P. Linnartz, M.L. Miller, C.B.S. Traw, Copy protection for DVD video, Special issue on identification and protection of multimedia information, Proc. IEEE 87 (7) (1999) 1267–1276.
4. Collusion-secure fingerprinting for digital data;Boneh;IEEE Trans. Inform. Theory,1998
5. C. Cachin, An information-theoretic model for steganography, in: D. Aucsmith (Ed.), Proceedings of the Second International Workshop on Information Hiding, Vol. 1525, Lecture Notes in Computer Science, Springer, Portland, Oregon, U.S.A., 1998, pp. 306–318.