Donoho, D.L., et al. 2002. Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In Recent advances in intrusion detection. Springer.
Faundez-Zanuy, M., M. Hagmüller, and G. Kubin. 2006. Speaker verification security improvement by means of speech watermarking. Speech Communication 48(12): 1608–1619.
Faundez-Zanuy, M., M. Hagmüller, and G. Kubin. 2007. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40(11): 3027–3034.
Hämmerle-Uhl, J., K. Raab, and A. Uhl. 2011. Watermarking as a means to enhance biometric systems: A critical survey. In Information hiding. Springer.
Rekik, S., et al. 2012. Speech steganography using wavelet and Fourier transforms. EURASIP Journal on Audio, Speech, and Music Processing 2012(1): 1–14.
Vatsa, M., R. Singh, and A. Noore. 2009. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3): 293–304.
Bartlow, N., et al. 2007. Protecting iris images through asymmetric digital watermarking. In 2007 IEEE Workshop on automatic identification advanced technologies. IEEE.
Huber, R., H. Stögner, and A. Uhl. 2011. Two-factor biometric recognition with integrated tamper-protection watermarking. In Communications and multimedia security. Springer.
Satonaka, T. 2002. Biometric watermark authentication with multiple verification rule. In Proceedings of the 2002 12th IEEE workshop on neural networks for signal processing, 2002. IEEE.
Nematollahi, M.A., H. Gamboa-Rosales, F.J. Martinez-Ruiz, I. Jose, S.A.R. Al-Haddad, and M. Esmaeilpour. 2016. Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools and Applications, 1–31.
Lien, N.T.H. 2009. Echo hiding using exponential time-spread Echo Kernel and its applications to audio digital watermarking and speaker recognition. Tokyo Institute of Technology.
Yan, B., and Y.-J. Guo. 2013. Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia tools and applications 67(2): 383–405.
Inamdar, V.S., and P.P. Rege. 2014. Dual watermarking technique with multiple biometric watermarks. Sadhana 39(1): 3–26.
Vielhauer, C., et al. 2006. Multimodal speaker authentication–evaluation of recognition performance of watermarked references. In Proceedings of the 2nd workshop on multimodal user authentication (MMUA), Toulouse, France.
Zhe-Ming, L., Y. Bin, and S. Sheng-He. 2005. Watermarking combined with CELP speech coding for authentication. IEICE Transactions on Information and systems 88(2): 330–334.
Ratha, N.K., J.H. Connell, and R.M. Bolle. 2000. Secure data hiding in wavelet compressed fingerprint images. In Proceedings of the 2000 ACM workshops on multimedia. ACM.
Vatsa, M., et al. 2004. Comparing robustness of watermarking algorithms on biometrics data. In Proceedings of the workshop on biometric challenges from theory to practice-ICPR workshop.
Qi, M., et al. 2010. A novel image hiding approach based on correlation analysis for secure multimodal biometrics. Journal of Network and Computer Applications 33(3): 247–257.
Fouad, M., A. El Saddik, and E. Petriu. 2010. Combining dwt and lsb watermarking to secure revocable iris templates. In 2010 10th International conference on information sciences signal processing and their applications (ISSPA). IEEE.
Khan, M.K., L. Xie, and J. Zhang. 2007. Robust hiding of fingerprint-biometric data into audio signals. In Advances in biometrics, 702–712. Springer.
Park, K.R., et al. 2007. A study on iris feature watermarking on face data. In Adaptive and natural computing algorithms, 415–423. Springer.
Noore, A., et al. 2007. Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169(2): 188–194.
Arya, M.S., and R. Siddavatam. 2013. Geometric robust multimodal biometric watermarking scheme for copyright protection of digital images. International Journal of Computer Applications 72(9): 40–52.
Vatsa, M., et al. 2006. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2): 23–28.
Ghouzali, S. 2015. Watermarking based multi-biometric fusion approach. In Codes, cryptology, and information security, 342–351. Springer.
Sheetal Chaudhary, R.N. 2015. A new multimodal biometric recognition system integrating Iris, face and voice. International Journal of Advanced Research in Computer Science and Software Engineering. 5(4): 145–150.
Soltane, M., N. Doghmane, and N. Guersi. 2010. Face and speech based multi-modal biometric authentication. International Journal of Advanced Science and Technology 21(6): 41–56.
Wang, S., et al. 2013. Augmenting remote multimodal person verification by embedding voice characteristics into face images. In 2013 IEEE International conference on multimedia and expo workshops (ICMEW). IEEE.
Gordon, G. and W. Iii. 2008. Quantum watermarking by frequency of error when observing qubits in dissimilar bases.
Panah, A.S., R. van Schyndel, T. Sellis, and E. Bertino. 2016. On the properties of non-media digital watermarking: a review of state of the art techniques.
Lee, S.H. 2014. DWT based coding DNA watermarking for DNA copyright protection. Information Sciences 273: 263–286.
Nakamoto, S. 2008. Bitcoin: a Peer-to-Peer Electronic Cash System. [Online]. http://www.cryptovest.co.uk/resources/Bitcoin%20paper%20Original.pdf.
Rosenfeld, M. 2012. Overview of colored coins, white paper. [Online]. https://bitcoil.co.il.
Leigh, D. 2016. A test bed for data hiding in financial transactions. [Online]. http://www.dylanleigh.net/portfolio/s3017239-summer-summary.pdf.
Petitcolas, F.A., R.J. Anderson, and M.G. Kuhn. 1998. Attacks on copyright marking systems. In Information hiding. Springer.
Voloshynovskiy, S., et al. 2001. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing 81(6): 1177–1214.
Kalker, T. 2001. Considerations on watermarking security. In 2001 IEEE Fourth Workshop on Multimedia Signal Processing. IEEE.
Petitcolas, F.A. (2004). Stirmark benchmark 4.0.
Craver, S., et al. 1998. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4): 573–586.
Obaid, A.H. 2015. Information hiding techniques for steganography and digital watermarking. UDC 681.518 (04) INTERACTIVE S < STEMS: Problems of human-computer interaction. Collection of scientific papers, 306 p, 63. Ulyanovsk: USTU.
Chandramouli, R., M. Kharrazi, and N. Memon. 2003. Image steganography and steganalysis: Concepts and practice. In Digital watermarking, 35–49. Springer.
Linnartz, J.-P.M. and M. Van Dijk. 1998. Analysis of the sensitivity attack against electronic watermarks in images. In Information hiding. Springer.
Holliman, M., and N. Memon. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9(3): 432–441.