1 "Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights" 1998.
2 "Selective block assign -ment approach for robust digital image water -marking" 3657 : 14-20, jan1999.
3 "Network and Internetwork Security" Prentice Hall 1995.
4 "Information Hiding tech -niques for steganography and digital water -marking" Artech House 1999.
5 "Fragile Water -marking Using VW2D Watermark" 3657 : 204-213, Jan1999.
6 "Content-based integrity protection of digital images" 3657 : 85-93, jan1999.
7 "Can invisible watermarks resol -ve rightful ownership" 3022 : 310-14 321, Feb1997
8 "Authenticity of Digi -tal Resources:Towards a Statement of Require -ments in the Research Process" June.1998
9 "Applied Cryptography" Willey 1996.
10 "A Robust Digital Image Watermarking Method using Wavelet- Based Fusion" 1 : 544-547, Oct,1997
1 "Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights" 1998.
2 "Selective block assign -ment approach for robust digital image water -marking" 3657 : 14-20, jan1999.
3 "Network and Internetwork Security" Prentice Hall 1995.
4 "Information Hiding tech -niques for steganography and digital water -marking" Artech House 1999.
5 "Fragile Water -marking Using VW2D Watermark" 3657 : 204-213, Jan1999.
6 "Content-based integrity protection of digital images" 3657 : 85-93, jan1999.
7 "Can invisible watermarks resol -ve rightful ownership" 3022 : 310-14 321, Feb1997
8 "Authenticity of Digi -tal Resources:Towards a Statement of Require -ments in the Research Process" June.1998
9 "Applied Cryptography" Willey 1996.
10 "A Robust Digital Image Watermarking Method using Wavelet- Based Fusion" 1 : 544-547, Oct,1997
11 "A Public Key Watermark for Image Verification and Authentication" Oct.1998