1. W. Stallings, Cryptography and Network Security: Principles and Practice, New Jersey: Prentice-Hall, 1999.
2. D.-C. Lou and C.-H. Sung, ”A steganographic scheme for secure communication based on chaos and Euler theorem,” submitted to IEEE Transactions on Multimedia, Aug. 1, 2000. (Revised, No: MM10288)
3. D.-C. Lou and J.-L. Liu, ”Fault resilient and compression tolerant digital signature for image authentication,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31–39, Feb. 2000.
4. C.-T. Li, D.-C. Lou, and J.-L. Liu, ”Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem,” to appear in Journal of the Chinese Institute of Electrical Engineering. (No: IN-01-007)
5. D.-C. Lou and T.-L. Yin, ”Adaptive digital watermarking using fuzzy clustering technique,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, vol. E84-A, no. 8, pp. 2052–2060, Aug. 2001.