[1]G.Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, 1993.
[2] C. Lu, "Meanquantizationfragile watermarking for image auth-entication,"Optical Engineering, vol.40, no.7, p.1396, 2001.
[3] C. Linand S.Chang,"Semi fragile watermarking for authentic-citing JPEG visual content,"Security and Watermarking of Multimedia Contents II,vol. 3971, pp. 140-151,2000.
[4] J. Fridrich, "A hybrid watermark for tamper detection in digital images,"Signal Processing and Its Applications, vol. 1, pp. 301-304, 1999.
[5] J. Zhao, "Embedding Robust Labels intoImages forCopyright Protection,"Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242-251, 1995.
[6] H. Mark Liao, C.Sze, Sh.Huang and CS.Lu, "Cocktail watermarking for digital image prote-ction,"IEEE Trans.Multimedia, vol. 2, no. 4, pp. 209-224, 2000.
[7] P. Lin, C. Hsieh and P. Huang, "A hierarchical digital watermarking method for image tamperdetection and recovery,"Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.
[8] L. Laouamer, M. AlShaikh, L. NanaandAC. Pascu,"Robust Watermarking Scheme andTamper Detection Based On Threshold Versus Intensity,"Journal of Innovation in Digital Ecosystems,vol. 2,no. 1,pp.1-12.,2016.
[9] T. Lee and S. Lin, "Dual watermark for image tamper detection and recovery,"Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
[10]T. Jing, X.Li and F.Zhang, "Image tamper detection algorithm based on Radon and Fourier-Mellin transform,"IEEE International Conference on Information Theory and Information Security,pp. 212-215,2010.
[11] R. Chamlawi, A. Khan and I. Usman, "Authentication and recovery of images using multiple watermarks,"Computers & Electrical Engineering, vol. 36, no. 3, pp. 578-584, 2010.
[12] A. Phadikar, S. Maity and M. Mandal, "Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images,"Journal ofVisual Communication and Image Representation, vol. 23, no. 3, pp. 454-466, 2012.
[13]Al-OtumandH. Munawer,"Semi-Fragile Watermarking for Grayscale Image Authentication andTamper Detection Based On anAdjusted Expanded-Bit Multiscale Quantization-Based Technique,"Journal of Visual Communication and Image Representation,vol. 25, no. 5, pp.1064-1081,2016.
[14] S. Dadkhah, AA. Manaf, Y. Hori, AE. Hassanienand S. Sadeghi, "An Effective SVD-Based Image Tampering Detection and Self-Recovery Using ActiveWatermarking,"Signal Processing: Image Communication,vol. 29, no. 10,pp. 1197-1210,2016.
[15] M. Iwata, T. Hori, A. Shiozaki and A. Ogihara, "Digital watermarking method for tamper detection and recovery of JPEG images,"International Symposium OnInformation Theory & Its Applications,pp. 309-314,2010.
[16] X. Tong, Y. Liu, M. Zhang and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery,"Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013.
[17] P. Singh and R. Chadha, "A survey of digital watermarking techniques, applications and attacks,"International Journal of Engineering and Innovative Technology, vol. 2, no. 9, 2013.
[18] C. Wu and Y. Shih, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections,"Optics and Photonics Journal, vol. 3, no. 02, pp. 103-107, 2013.
[19] J. Chen and C. Chen, "Image Tamper Detection Scheme Using QR Code and DCT TransformTechniques,"International Journal of Computer, Consumer and Control, vol. 1, no. 2, 2012.
[20] C.Wang, RH.Hwang, TS.Chen and HY.Lee, "Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding,"19th International Conference on Advanced Information Networking and Applications vol.1, 2005.
[21] O. Benrhouma,H. Houcemeddineand Safya Belghith,"Tamper Detection and Self-Recovery Scheme by DWT Watermarking,"Nonlinear Dynamics,vol. 79,no. 3, pp. 1817-1833, 2014.
[22]C. Li, A. Zhang, Z. Liu, L. Liao and D. Huang,"Semi-Fragile Self-Recoverable Watermarking Algorithm Based On Wavelet Group Quantization and Double Authentication,"Multimedia tools and applications,vol. 74,no. 23, pp.728-739, 2016.
[23] SB. SolorioandK. Nandi,"Secure fragile watermarking method for image authentication withimproved tampering localization and self-recoverable capabilities,"vol. 91, no. 4, pp.728-739,2011.
[24] MJ. TsaiandC. Chien,"Authentication and recovery for wavelet-based semifragile watermarking,"Optical Engineering,vol. 47, no. 6,p. 067005,2008.
[25]JW. Wang, SG. LianandY. Dai,"Secure multimedia watermarking authentication in wavelet domain,"Journal of Electronic Imaging, vol. 17, no. 3, pp. 033010:1-033010:12, 2008.
[26]F. Petitcolas, Watermarking Stirmark, http://petitcolas.net/-fabien/watermarking/stirmark/, 2012.