1. B. Furht, D. Socek, A survey of multimedia security, Comprehensive report, 2003
2. A. Abusukhon, M. Talib, I. Ottoum, Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 1, 263 (2012)
3. Y.-C. Chen, L.-W. Chang, A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm, in Proceedings of 2001 International Conference on Image Processing, Vol. 2 (IEEE, 2001) pp. 518--521
4. B. Schneier, Applied Cryptography, Vol. 4 (John Wiley & Sons Inc, New York, 1996)
5. W. Stallings, Cryptography and Network Security, 4th edition (Pearson Education India, 2006)