Further readings and references
Eggers, A., Kontopoulos, S., Corubolo, F., Gill, A. (2015), Encapsulation of Environmental Information. Deliverable 4.1 of the PERICLES project.
Miller, A. (2012). Least Significant Bit Embeddings: Implementation and Detection. At http://www.aaronmiller.in/thesis.
Image authentification
Bartolini, F., Tefas, A., Barni, M., & Pitas, I. (2001). Image authentication techniques for surveillance applications. Proc. of the IEEE, 89(10), 1403-1418.
Ho, A. T., Zhu, X., & Guan, Y. L. (2004). Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing, 2004, 2174-2184.
On watermarking
Li, C. T., & Si, H. (2007). Wavelet-based fragile watermarking scheme for image authentication. Journal of Electronic Imaging, 16(1), 013009-013009.
Li, C. T., & Yuan, Y. (2006). Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Optical Engineering, 45(12), 127001-127001.
Lin, H. Y. S., Liao, H. Y. M., Lu, C. S., & Lin, J. C. (2005). Fragile watermarking for authenticating 3-D polygonal meshes. Multimedia, IEEE Transactions on, 7(6), 997-1006.
Lin, C. H., Su, T. S., & Hsieh, W. S. (2007). Semi-fragile watermarking scheme for authentication of JPEG images. Tamkang Journal of Science and Engineering, 10(1), 57-66.
Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613-621.
Zheng, D., Liu, Y., Zhao, J., & Saddik, A. E. (2007). A survey of RST invariant image watermarking algorithms. ACM Computing Surveys (CSUR), 39(2), 5.