1. Ingemar J. Cox, Matt L. Miller, “Review of watermarking and the importance of perceptual modeling,” Proc. SPIE 3016, 92 (1997), DOI: 10.1117/12.274502.
2. Matt L. Miller, Ingemar J. Cox, Jean-Paul M. G. Linnartz, Ton Kalker, “A review of watermarking principles and practices,” in Digital Signal Processing for Multimedia Systems (CRC Press, 1999), pp. 461–485 [ed. by K. K. Parhi, T. Nishitami], ISBN: 0824719247.
3. Abdullah M. Iliyasu, Phuc Q. Le, Fandyan Dong, Kaoru Hirota, “Watermarking and authentication of quantum images based on restricted geometric transformations,” Information Sciences 186, No. 1, 126 (Mar. 2012), DOI: 10.1016/j.ins.2011.09.028.
4. Luis Rosales-Roldan, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Hector Perez-Meana, Brian Kurkoski, “Watermarking-based image authentication with recovery capability using halftoning technique,” Signal Processing: Image Communication 28, No. 1, 69 (Jan. 2013), DOI: 10.1016/j.image.2012.11.006.
5. Mohammed S. Khalil, Fajri Kurniawan, Muhammad Khurram Khan, Yasser M. Alginahi, “Two-layer fragile watermarking method secured with chaotic map for authentication of digital holy Quran,” The Scientific World Journal 2014, Article ID 803983 (2014), DOI: 10.1155/2014/803983.