1. Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Marcel Decker, New York, pp 6–11
2. Ferguson N, Schneier B, Kohno T (2008) Cryptography engineering: design principles and practical applications. Wiley Press, ISBN: 9780470474242
3. Haouzia A, Noumeir R (208) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46
4. Hernndez-Avalos P A, Feregrino-Uribe C, Cumplido R, Garcia-Hernandez J J (2010) Towards the construction of a benchmark for video watermarking systems: temporal desynchronization attacks. In: Proc. of the 53nd MWSCAS, pp 628–631
5. Li D, Liu Z, Cui L (2016) A zero-watermark scheme for identification photos based on QR code and visual cryptography. Int J Secur Appl 10(1):203–214