1. Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the International Conference on Image Analysis and Processing, pp. 535–540 (2001)
2. Atrey, P.K., Yan, W.-Q., Chang, E.-C., Kankanhalli, M.S.: A hierarchical signature scheme for robust video authentication using secret sharing. In: Proceedings of the International Conference on Multimedia Modelling, pp. 330–337 (2004)
3. Atrey, P.K., Yan, W.-Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Multimed. Tools Appl. 34(1), 107–135 (2006)
4. Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007)
5. Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001)