References
- ANDERSON , R. J. and PETITCOLAS , F. A. P. 1998 . On the limits of Steganography . IEEE Journal of Selected Areas in Communications , 16 : 474 – 481 .
- BAND , J. 1999 . Making the World safe for databases. IP Magazine April 1999
- BENDER , W. , GRUHL , D. , MORIMOTO , N. and Lu , A. 1996 . Techniques for data hiding . IBM Systems Journal , 35 : 313 – 336 .
- BENEDENS , O. 1999 . Geometry-based watermarking of 3D models . IEEE Computer Graphics and Application , : 46 – 55 .
- BRASSIL , J. , Low , S. H. , MAXEMCHUK , N. and O'GORMA , L. 1995 . Electronic marking and identification techniques to discourage document copying . IEEE Journal of Selected Areas in Communications , 13 : 1495 – 1504 .
- CEC (COMMISSION OF THE EUROPEAN COMMUNITIES) . 1996 . Council Directive on the Legal Protection of Databases . COM , 95 : 382 Final. Official Journal of the European Communities, of 27/3/96. 31996L0009
- Cox , I. J. and LINNARTZ , J. P. M. G. 1998 . Some general methods for tampering with watermarks . IEEE Journal on Selected Areas in Communications , 16 : 587 – 593 .
- Cox , I. J. , KILIAN , J. , LEIGHTON , T. and SHAMOON , T. 1997 . Secure spread spectrum watermarking for multimedia . IEEE Transactions on Image Processing , 6 : 1673 – 1687 .
- CRAVER , S. , MEMON , N. , YEO , B. L. and YEUNG , M. 1998 . Resolving rightful ownerships with invisible watermarking techniques limitations, attacks and implications . IEEE Journal on Selected Areas in Communications , 16 : 573 – 586 .
- DATE , H. , KANAI , S. and KISHINAMI , T. Digital watermarking for 3D polygonal model based on wavelet transform . Proceedings of DETC'99—1999 ASME Design Engineering Technical Conferences . September 12–15 1999 , Las Vegas, Nevada. DETC99/CIE-9031
- DELAIGLE , J. F. , VLEESCHOUWER , C. D. and MACQ , B. 1998 . Watermarking algorithm based on a human visual model . Signal Processing , 66 : 319 – 335 .
- FREDRICSSON , P. 2000 . Vattenmärkning i digitala miljöer. (Watermarking in digital media) Unpublished manuscript in Swedish
- GARLAND , M. 1999 . Multiresolution modeling survey and future opportunities. EUROGRAPHICS'99 , ISSN 1017-4956 111 – 131 .
- GOPALAKRISHNAN , K. , MEMON , N. and VORA , P. Protocols for watermark verification . Proceedings of the Multimedia and Security Workshop (held as a part of the 7th annual ACM International Multimedia Conference at Orlando, Florida in Oct 1999), GMD Report No. 85 . December 1999 . pp. 91 – 94 .
- KARJALA , D. 1995 . Copyright in electronic maps . Jurimetrics Journal , 35 : 395 – 415 .
- KUTTER , M. and PETITCOLAS , F. A. P. 1999 . “ A fair benchmark for Image watermarking systems ” . In Security and Watermarking of Multimedia Contents , ISBN 0-8194-3128 Edited by: Wong , P. W. and Delp , E. J. 226 – 239 .
- KUTTER , M. , JORDAN , F. and BOSSEN , F. 1998 . Digital signature of colour images using amplitude modulation . Journal of Electronic Imaging , 7 : 326 – 332 .
- KUTTER , M. , VOLOSHYNOVSKIY , S. and HERRIGEL , A. The watermark copy attack . Proceedings of SPIE: Security and Watermarking of Multimedia Content II, 3971 . San José, CA
- Low , S. H. and MAXEMCHUK , N. F. 1998 . Performance comparison of two text marking methods . IEEE Journal on Selected Areas in Communications , 16 : 561 – 572 .
- Low , S. H. , MAXEMCHUK , N. F. and LAPONE , A. M. 1998 . Document identification for copyright protection using Centroid detection . IEEE Transactions and Communications , 46 : 372 – 383 .
- MEMON , N. and WONG , P. W. A buyer-seller watermarking protocol . Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP-98) . December 7–9 , Los Angeles, California, US. pp. 278 – 283 .
- MINTZER , F. C. , BOYLE , L. E. , CAZES , A. N. , CHRISTIAN , B. S. , COX , S. C. , GIORDANO , F. P. , GLADNEY , H. M. , LEE , J. C. , KELMANSON , M. L. , LIRANI , A. C. , MAGERLEIN , K. A. , PAVANI , A. M. B. and SCHIATTARELLA , F. 1996 . Towards on-line, worldwide access to Vatican Library materials . IBM Journal of Research and Development , 4
- MONMONIER , M. 1996 . How to Lie with Maps, , 2nd edition , ISBN 0226534200 Chicago : University of Chicago Press .
- NKOLAIDIS , N. and PITAS , I. Copyright protection of images using robust digital signatures . IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-96) . Vol. 4 , pp. 2168 – 2171 .
- NKOLAIDIS , N. and PITAS , I. 1998 . Robust image watermarking in the spatial domain . Signal Processing , 66 : 385 – 403 .
- O'GORMAN , L. 1993 . The document spectrum for structural page layout analysis . IEEE Transactions on Pattern Analysis and Machine Intelligence , 15 : 1162 – 1173 .
- OHBUCHI , R. , MASUDA , H. and AONO , M. 1997 . Watermarking three-dimensional polygonal models , ACM Multimedia 97 261 – 272 . London : ACM Press .
- OHBUCHI , R. , MASUDA , H. and AONO , M. 1998 . Watermarking three-dimensionnal polygonal models through geometric and topological modifications . IEEE Journal on Selected Areas in Communications , 16 : 551 – 560 .
- ONSRUD , H. J. and LÒPEZ , X. 1998 . “ Intellectual property rights in disseminating digital geographic data, products and services: conflicts and commonalities among European Union and United States approaches ” . In European Geographic Information Infrastructures: Opportunities and Pitfalls , Edited by: Masser , I. and Salgé , F. 153 – 167 . London : Taylor and Francis .
- PETITCOLAS , F. and KUHN , M. 1997 . StirMark 2
- PODILCHUK , C. and ZENG , W. 1998 . Image adaptive watermarking using visual models . IEEE Journal on Selected Areas in Communications , 16 : 525 – 540 .
- PRAUN , E. , HOPPE , H. and FINKELSTEIN , A. Robust mesh watermarking. Computer Graphics . SIGGRAPH 1999 Proceedings . pp. 69 – 76 . Also available at
- RAMKUMAR , M. 1999 . Data hiding in Multimedia—Theory and Applications , Newark, NJ : New Jersey Institute of Technology, Department of ECE, University Heights . Ph.D Dissertation
- RAMKUMAR , M. and AKANSU , A. N. 1999 . Image watermarks and counterfeit attacks: some problems and solutions. Content Security and Data Hiding in Digital Media 102 – 112 . Newark, NJ
- SCHNEIER , B. 1995 . Applied Cryptography: Protocols, Algorithms and Source Code , ISBN: 0471117099 Chichester, New York : John Wiley & Sons .
- SERVETTO , S. D. , PODILCHUK , C. L and RAMCHANDRAN , K. Capacity issues in digital image watermarking . Proceedings of the IEEE International Conference on Image Processing . Chicago, IL.
- Su , P. C. , WANG , H. J. and Kuo , C. C. J. Blind digital watermarking for cartoon and map images . Proceedings of SPIE Vol.3657, Security and Watermarking of Multimedia Contents . Edited by: Ping , Wah Wong and Delp , Edward J. pp. 296 – 306 .
- THORNER , B. B. 1997 . Copyright protection for computer databases: the threat of Feist and a proposed solution . Virginia Journal of Law and Technology , 1
- VAN SCHYNDEL , R. G. , TIRKEL , A. Z. and OSBORNE , C. F. A digital watermark . Proceedings of the IEEE International Conference on Image Processing (ICIP'94) . vol II , pp. 86 – 90 .
- VOYATZIS , G. and PITAS , I. 1999 . Protecting digital-image copyrights: a framework . IEEE Computer Graphics and Applications , 19 : 18 – 24 .
- YEO , B. L. and YEUNG , M. M. 1999 . Watermarking 3D objects for verification . IEEE Computer Graphics and Applications , : 36 – 45 .
- ZENG , W. and LIU , B. 1999 . A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images . IEEE Transactions on Image Processing , 8 : 1534 – 1548 .
- ZHAO , J. , KOCK , E. and Luo , C. 1998 . In business today and tomorrow . Communications of the ACM , 41 : 67 – 72 .