C. Fei, D. Kundur and R. H. Kwong, "Analysis and design of secure
watermark-based authentication system," IEEE Trans. on Information
Forensics and Security, vol.1, no.1, pp.43-55, March 2006.
 Y. M. Y. Hasan and A. M. Hassan, "Dual domain localized
autorecovery image authentication," in Proc. Information Security
Symposium (ISS-06), Al-Madina, KSA, May 2-4, 2006, pp.138-148.
 P. W. Wong, "A public key watermark for image verification and
authentication," in Proc. ICIP, NY, USA, Oct.4-7, 1998, pp.425-429.
 P. W. Wong and N. Memon, "Secret and public key image watermarking
schemes for image authentication and ownership verification," IEEE
Trans. on Image Proc., vol.10, no.10, Oct. 2001.
 Y. M. Hasan and A. M. Hassan, "Tamper detection with self-correction
hybrid spatial-DCT domains image authentication technique," in Proc.
IEEE ISSPIT'07,Cairo, Egypt, 2007.
 Y. M. Y. Hasan and A. M. Hassan, "Fragile blockwise image
authentication thwarting vector quantization attack," in Proc. IEEE
ISSPIT-04, Rome, Italy, Dec. 18-21, 2004, pp.530-533.
 E. Lin and E. Delp, "A review of fragile image watermarks," in Proc. of
the ACM Multimedia and Security Workshop, 1999, pp. 25-29.
 M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical
image authentication watermark with improved localization and
security," in Proc. ICIP'01, Greece, Oct. 2001, pp.502-505.
 E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations
using semi-fragile watermarks," in Proc. of the SPIE Int. Conf. on
Security and Watermarking of Multimedia Contents II, vol. 3971, San
Jose, CA, USA, Jan. 23 - 28, 2000.
 O. Ekici, B. Sankur, B. Coskun, U. Naci and M. Akcay, "Comparative
evaluation of semi-fragile watermarking algorithms," Journal of
Electronic Imaging, vol.13, no.1, pp.209-216, Jan. 2004.
 K. Al-sultan, M. Saeb and U. Badawi, "A proposed semi-fragile
watermarking scheme for image authentication," in Proc. ICCTA-04,
Alexandria, Egypt, Sep.6-9, 2004.
 J. Fridrich, "Robust bit extraction from images," in Proc. IEEE
ICMCS'99, Florence, Italy, vol. 2, June 7-11, 1999, pp.536-540.
 J. Fridrich, "Visual hash for oblivious watermarking," in Proc. SPIE
Photonic West Electronic Imaging: Security and Watermarking of
Multimedia Contents, San Jose, U.S.A., Jan. 24-26, 2000, pp.286-294.
 J. Fridrich, M. Goljan, "Robust hash functions for digital watermarking,"
in Proc. ITCC, CA, USA, March 2000, pp.173-178.
 J. Fridrich and M. Goljan, "Images with self-correction capabilities," in
Proc. ICIP'99, Kobe, Japan, 1999.
 J. Fridrich and M. Goljan, "Protection of digital images using self
embedding," Symp. Content Security and Data Hiding in Digital Media,
New Jersey Institute of Technology, May 14, 1999.
 M. Celik, Gaurav , G. Sharma, A. M. Tekalp , E. Saber, " Video
authentication with self recovery," Proceedings of SPIE, Security and
atermarking of Multimedia Content IV, vol 4675. San Jose, CA, USA ,
pp 531-541, 2003.
 D. He, Q. Sun, and Q. Tian, "A secure and robust object-based video
authentication system," EURASIP Journal on Applied Signal
Processing, vol. 2004, Issue 14, PP 2185-2200, Jan. 2004.
 D. Pröfrock, H. Richter, M. Schlauweg, E. M├╝ller, "H.264/AVC video
authentication using skipped macroblocks for an erasable watermark, "
Proc. of the VCIP, Beijing, China, July 2005.
 N. Ramaswamy, K. R. Rao, "Video authentication for H.264/AVC using
digital signature standard and secure hash algorithm, " Proceedings of
the 2006 international workshop on Network and Operating Systems
Support for Digital Audio and Video 2006, Newport, Rhode Island
November 22 - 23, 2006.
 M. Holliman and N. Memon, "Counterfeiting attacks on oblivious blockwise
independent invisible watermarking schemes," IEEE Trans. on
Image Processing, vol. 9, no. 3, pp.432-441, March 2000.
 M. Kutter, S. Voloshynovskiy znd A. Herrigl, "The watermark copy
attack," in Proc. SPIE Elect. Imaging, San Jose, USA, Jan. 23-28, 2000.
 D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on
watermarking systems," IEEE Trans. on Signal Processing, pp.1-9,
 H. Lue, Z. Lu, S. Chu, and J. Pan, "Self embedding watermarking
scheme using halftone image," IIEICE Transactions on Information and
 C. Lin and S. F. Chang, "SARI: self-authentication-and-recovery image
watermarking system," Proceedings of the ninth ACM Conference on
Multimedia, Ottawa, Canada ,2001.
 A. J. Menezes, P. C. Orschot, and S. A. Vanstone, Handbook of Applied
Cryptography, CRC Press, 2001.
 B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source
Code in C, John Wiley & Sons, USA, 1996.
 S. Wang and S. Tsai, "Automatic image authentication and recovery
using fractal code embedding and image inpainting," Journal of the
Pattern Recognition Society, vol. 41, pp. 701 - 712, 2008.