1. Miller, M. L., I. J. Cox, J. M. G. Linnartz, and T. Kalke, "A review of watermarking principles and practices," IEEE International Conference on Image Processing, 1997.
2. Shoemaker, C. and Rudko, Hidden bits: A survey of techniques for digital watermarking, Independent Study EER-290 Prof. Rudko, Spring 2002.
3. Liu, R. and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. on Multimedia, Vol. 4, No. 1, March 2002.
4. Wang, Y. H., T. N. Tan, and Y. Zhu, "Face verification based on singular value decomposition and radial basis function neural network ,", National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences.
5. Ganic, E. and A. M. Eskicioglu, A DFT-BASED semi-blind multiple watermarking scheme images, CUNY Brooklyn College, 2900 Bedford Avenue, Brooklyn, NY 11210, USA.
6. Tewfik, A. H., "Watermarking digital image and video data ," IEEE Signal Processing Magazine, September 2000.
7. Sverdlov, A., S. Dexter, and A. M. Eskicioglu, "Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies," Proceedings of the 13th European Signal Processing Conference, 2005.
8. Petitcolas, F. A. P., R. J. Anderson, and M. G. Kuhn, "Information hiding—A survey," Proceeding of the IEEE , Vol. 87, No. 7, July 1999.
9. Lin, C. Y., M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scaling, and translation resilient watermarking for images ," IEEE Transactions on Image Processing, Vol. 10, No. 5, May 2001.
doi:10.1109/83.918569
10. Shieh, J. M., D. C. Lou, and M. C. Chang, "A semi-blind watermarking scheme based on singular value decomposition," Computer Standards & Interface, Vol. 28, 428-440, 2006.
doi:10.1016/j.csi.2005.03.006
11. Xiao, L., Z. H. Wei, and H. Z. Wu, "Ridgelet-based robust and perceptual watermarking for images," IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No. 2B, February 2006.