Anderson, R.,Needham, R., and Shamir, A., The Steganographic File System, University of Cambridge, U.K.
Bloom, J.A.,Cox, I.J.,Kalker, T.,Linnartz, J.-P.M.G., and Miller, M.L., "Copy Protection for DVD Video," IEEE, 87, 7, July 1999.
Boney, L.,Twefik, A.H.,Hamdy, K.N., Digital Watermarks for Audio Signals, Department of Electrical Engineering, 1996.
Borland, J., "Movie Industry Dealt DVD-Cracking Blow," CNET News, November 1, 2001.
Clelland, C.T.,Risca, V., and Bancroft, C., "Hiding Messages in DNA Microdots," Nature, 399, 533–534, 1999.
Cook, S., "Audio Revolution Blasts Record Companies," Christian Science Monitor, April 1999.
Czerwinski, S.,Fromm, R., and Hodes, T., Digital Music Distribution and Audio Watermarking, Computer Science Division, University of California.
Deutsch, R.W., More Tales from Encryption, Wired News, January 1999.
Drummond, M., "The Madison Project: The Future of Downloadable CDs is Here … but Don't Tell Anybody."
Gilbert, B., Steganography: Why It Matters in a "Post 911" World, SANS Institute, 2002.
Gong, L., Digital Watermarking: A Survey and Experiment, University of Bridgeport, 2002.
Hartung, F. and Girod, B., Watermarking of Compressed and Uncompressed Video, University of Erlangen-Nuremberg, 1998.
Herrigel, A.,Ruandiadh, J.O.,Peterson, H.,Pereira, S., and Pun, T., Secure Copyright Protection Techniques for Digital Images, University of Geneva.
IBM Cryptolope Technology, Executive Summary, available at www.ibm.com
Jessup, P., "The Business Case for Audio Watermarking," International Federation of the Phonographic Industry.
Jones, C., "Crypto Creeps into MP3 Domain."
Judge, J.C., Steganography: Past, Present, and Future, SANS, 2001.
Katzenbeisser, S. and Petitcolas, F.A.P., (Eds.), Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.
Kelley, J., "Terror Groups Hide behind Web Encryption," USA Today, February 5, 2001.
Key2Audio, available at www.sony.com
Kirovski, D.,Peinado, M., and Petitcolas, F.A.P., Digital Rights Management for Digital Cinema, Microsoft Research.
Lacy, J.,Quackenbush, S.R.,Reibman, A.R., and Snyder, J.H., Intellectual Property Protection Systems and Digital Watermarking, AT&T Labs-Research, Florham Park, NJ.
Lau, S., An Analysis of Terrorist Groups' Potential Use of Electronic Steganography, SANS Institute, 2002.
MagicGate and OpenMG, available at www.sony.com
McCullagh, D., "Bin Laden: Steganography Master?" Wired News, February 2001.
McDonald, A.D. and Kuhn, M.G., StegFS: A Steganographic File System for Linux, University of Cambridge, Computer Laboratory, U.K.
MP3Newswire.net, available at www.mp3newswire.net/sect/archive.htm
Petitcolas, F.A.P.,Anderson, R.J., and Kuhn, M.G., "Information Hiding — A Survey," IEEE, July 1999.
Provos, N. and Honeyman, P., Detecting Steganographic Content on the Internet, Center for Information Technology, University of Michigan, 2001.
Schneier, B. and Wayner, P., "Cryptogram — Terrorists and Steganography," Counterpane Internet Security, Inc., 2001.
Weatherhead, B., "The Digital Link: Understanding the Digital Home Video Controversy on Commercial Content (Copy) Protection," Home Theater and High Fidelity, February, 2002.