1. A survey of passive image tampering detection;Ho,2009
2. A passive image authentication scheme for detecting region-duplication forgery with rotation;Liu;Journal of Network and Computer Applications,2010
3. F. Shamshiri, Rotten Gods, 2008. [Online]. Available: http://www.rottengods.com/2008/07/missles-forgery.html. (accessed 01.03.12).
4. Blind passive media forensics: motivation and opportunity;Sebe,2007
5. Recent advances in multimedia information system security;Lian;Informatica,2009