1. Sklavos N, Zhang X (2007) Wireless security & cryptography: specifications and implementations. CRC Press/Taylor and Francis. ISBN:084938771X
2. Macq B, Dittmann J, Delp EJ (2004) Benchmarking of image watermarking algorithms for digital rights management. Proc IEEE 92(6):971–984
3. Lu ZM, Xu DG, Sun SH (2006) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 14(6):822–831
4. Kim HS, Lee HK (2003) Invariant image watermark using Zernike moments. IEEE Trans Circuit Syst Video Technol 13(8):766–775
5. Chu WC (2003) DCT-based image watermarking using subsampling. IEEE Trans WSN 5(1):34–38