Supplementary information sources

books-icon

Further readings and references

Eggers, A., Kontopoulos, S., Corubolo, F., Gill, A. (2015), Encapsulation of Environmental Information. Deliverable 4.1 of the PERICLES project.

Miller, A. (2012). Least Significant Bit Embeddings: Implementation and Detection. At http://www.aaronmiller.in/thesis.

Image authentification

Bartolini, F., Tefas, A., Barni, M., & Pitas, I. (2001). Image authentication techniques for surveillance applications. Proc. of the IEEE, 89(10), 1403-1418.

Ho, A. T., Zhu, X., & Guan, Y. L. (2004). Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing, 2004, 2174-2184.

On watermarking

Li, C. T., & Si, H. (2007). Wavelet-based fragile watermarking scheme for image authentication. Journal of Electronic Imaging, 16(1), 013009-013009.
Li, C. T., & Yuan, Y. (2006). Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Optical Engineering, 45(12), 127001-127001.

Lin, H. Y. S., Liao, H. Y. M., Lu, C. S., & Lin, J. C. (2005). Fragile watermarking for authenticating 3-D polygonal meshes. Multimedia, IEEE Transactions on, 7(6), 997-1006.
Lin, C. H., Su, T. S., & Hsieh, W. S. (2007). Semi-fragile watermarking scheme for authentication of JPEG images. Tamkang Journal of Science and Engineering, 10(1), 57-66.
Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613-621.
Zheng, D., Liu, Y., Zhao, J., & Saddik, A. E. (2007). A survey of RST invariant image watermarking algorithms. ACM Computing Surveys (CSUR), 39(2), 5.