1. Ahmad I, Millie A, Chang P, Ahn W (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics
2. Boneh D, Shoup V (2015) A graduate course in applied cryptography
3. Bourgeois J, Michel P, Raska S, Rubio B, Erra R (2004) Watermarking. Cours
4. Cachin C (2005) Digital steganography. Encyclopedia of Cryptography and Security, pp 1–7
5. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2006) Special issue on steganography and digital watermarking. Network 153(3):2005–2006