1. Schneier, B.: Applied Cryptography: Protocols, Algorithm, and Source Code in C, 2nd edn. Wiley, New York (1996)
2. Xie, L., Arce, G.R.: A class of authentication digital watermarks for secure multimedia communication. IEEE Trans. Image Process. 10(11), 1754–1764 (2001)
3. Wang, K., Lavoue, G., Denis, F., Baskurt, A.: Three-dimensional meshes watermarking: review and attack-centric investigation. In: Information Hiding, pp. 50–64 (2007)
4. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)
5. Wang, K., Lavoue, G., Denis, F., Baskurt, A.: A fragile watermarking scheme for authentication of semi-regular meshes. In: Proc. of EUROGRAPHICS 2008, pp. 5–8 (2008)