1. Robust image hashing for content authentication with tampering localization and image recovery;Sidharthan,2017
2. A secure and robust hash-based scheme for image authentication;Ahmed;Signal Processing,2010
3. Data embedding in digital images using critical functions;Liao;Signal Processing: Image Communication,2017
4. A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability;Rakhmawati;EURASIP Journal on Image and Video Processing,2019
5. Schneier B. Applied cryptography, 1996 john wiley & sons. Inc, USA.