Can Invisible Watermarks Resolve Rightful Ownerships? Introduces the ambiguity attack, also called the inversion attack, the Craver attack, or the "IBM attack" (the people at IBM call it "The RSS attack," and I assume the extended version would be "RSS/E.")
This is the original IBM research report, later published in proceedings of SPIE.