1. Chang C-C, Fan Y-H, Tai W-L (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41:654–661
2. Chen F, He H, Huo Y, Wang H (2011) Self-recovery fragile watermarking scheme with variable watermark payload. Proc Int Conf IWDW LNCS 7128:142–155
3. Fridrich J, Goljan M (1999) Protection of digital images using self-embedding, Proc. Int. Conf. Content Security and Data Hiding in Digital Media
4. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11:262–274
5. He H, Zhang J, Tai H-M (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. Proc Int Conf Inf Hiding Work LNCS 5806:132–145