1. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking of images, audio and video, in: Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 243–246, 1996.
2. R.L.G. Langelaar, J. Biemond, Watermarking by DCT coefficient removal: statistical approach to optimal parameter settings, in: Proceedings of the SPIE IS&T/SPIE's Eleventh Annual Symposium on Electronic Imaging: Security and Watermarking of Multimedia Contents, vol. 3657, pp. 2–13, 1999.
3. Gangyi Jiang, Mei Yu, Shoudong Shi , Xiao Liu, Yong-Deak Kim, New blind image watermarking in DCT domain, in: Proceedings of the Sixth International Conference on Signal Processing, vol. 2, pp. 1580–1583, 2002.
4. Digital Fragile Watermarking Scheme For Authentication Of JPEG Images;Li;IEE Proceedings—Vision Image and Signal Processing,2004
5. H.X. Wang, K. Ding, C.X. Liao, Chaotic watermarking scheme for authentication of JPEG images, in: Proceedings of the International Symposium on Biometrics and Security Technologies, pp. 1–4, 2008.