[1] Acken, J. M., ˜ ˜How Watermarking Adds Value to Digital Content, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 75 “77.
[2] Garfinkel, S., with E. H. Spafford, Web Security, Privacy & Commerce, Second Edition , Sebastopol, CA: O Reilly & Associates, 2001.
[3] Lehman, B. A., and R. H. Brown, Intellectual Property and the National Information Infrastructure , Report of the Working Group on Intellectual Property Rights, Section C, Part II, 1995.
[4] Lotspiech, J., U. Kohl, and M. A. Kaplan, ˜ ˜Cryptographic Envelopes and Digital Library, IBM Research Report RJ 10069, 1997.
[5] von Faber, E., E. Hammelrath, and F. P. Heider, ˜ ˜The Secure Distribution of Digital Contents, Proceedings of Annual Computer Security Applications Conference (ACSAC 97), December 1997, pp. 16 “22.
[6] Wagner, N. R., ˜ ˜Fingerprinting, Proceedings of the IEEE Symposium on Security and Privacy , 1983, pp. 18 “22.
[7] Petitcolas, F., and S. Katzenbeisser (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking , Norwood, MA: Artech House, 2000.
[8] Bloom, J., M. Miller, and I. Cox, Digital Watermarking , San Francisco, CN: Morgan Kaufmann Publishers, 2001.
[9] Pfitzmann, B., and M. Schunter, ˜ ˜Asymmetric Fingerprinting, Proceedings of EUROCRYPT 96, pp. 84 “95.
[10] Chor, B., A. Fiat, and M. Naor, ˜ ˜Tracing Traitors, Proceedings of EUROCRYPT 94, pp. 257 “270.
[11] Pfitzmann, B., ˜ ˜Trials of Traced Traitors, Proceedings of Workshop on Information Hiding , 1996, pp. 49 “64.
[12] Craver, S., et al., ˜ ˜Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks, and Implications, IEEE Journal on Selected Areas in Communications , Vol. 16, No. 4, May 1998, pp. 573 “586.
[13] Craver, S., B.-L. Yeo, and M. Yeung, ˜ ˜Technical Trials and Legal Tribulations, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 45 “54.
[14] Zhao, J., E. Koch, and C. Luo, ˜ ˜In Business Today and Tomorrow, Communications of the ACM , Vol. 41, No. 7, July 1998, pp. 67 “72.