R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," Proc. ICIP'94, 2, 86-90 (1994).
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," Proc. ICIP'96, 3, 243-246 (1996).
J. Zhao and E. Koch, "Embedding robust labels into images for copyright protection," Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, Austria, August 21-25, 242-251 (1995).
R. B. Wolfgang and E. J. Delp, "A watermark for digital images," Proc. ICIP'96, 3, 219-222 (1996).
I. Pitas, "A method for signature casting on digital images," Proc. ICIP'96, 3, 215-218 (1996).
N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," Proceedings of ICASSP'96, Atlanta, Georgia, May, 2168-2171 (1996).
M. D. Swanson, B. Zhu, and A. H. Tewfik, "Transparent robust image watermarking," Proc. ICIP'96, 3, 211-214 (1996).
M. Schneider and S.-F. Chang, "A robust content based digital signature for image authentication," Proc. ICIP'96, 3, 227-230 (1996).
S. Mallat, "Multiresolution approximations and wavelet orthonormal bases of L 2 (R)," Trans. Amer. Math. Soc., 315, 69-87 (1989).
I. Daubechies, "Orthonormal bases of compactly supported wavelets," Comm. on Pure and Appl. Math., 41, 909-996 (1988).
O. Rioul and M. Vetterli, "Wavelets and signal processing," IEEE Signal Processing Magazine, 14-38, (1991).
I. Daubechies, Ten Lectures on Wavelets, (SIAM, Philadelphia, 1992).
P. P. Vaidyanathan, Multirate Systems and Filter Banks, (Prentice Hall, Englewood Cliffs, NJ, 1993).
M. Vetterli and J. Kovacevic, Wavelets and Subband Coding, (Prentice Hall, Englewood Cliffs, NJ, 1995).
G. Strang and T. Q. Nguyen, Wavelets and Filter Banks, (Wellesley-Cambridge Press, Cambridge, 1996).
J. Shapiro, "Embedded image coding using zerotrees of wavelet coefficients," IEEE Trans. on Signal Processing, 41, 3445-3462 (1993).
R. Ulichney, Digital Halftoning, (MIT Press, Massachusetts, 1987).
S. Craver, N. Memon, B-L Yeo, and M. M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," IBM Research Report (RC 20755), March 1997.