BLYTHE, Paul; FRIDRICH, Jessica (August 2004). "Secure digital camera"(PDF). Digital Forensic Research Workshop: 11–13. Archived(PDF) from the original on 2010-06-10. Retrieved 23 July 2018.
Zigomitros, Athanasios; Papageorgiou, Achilleas; Patsakis, Constantinos (2012). "Social network content management through watermarking". 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. pp. 1381–1386. doi:10.1109/TrustCom.2012.264. ISBN978-1-4673-2172-3. S2CID17845019.
Rowayda, A. Sadek (2008). "Blind Synthesis Attack on SVD Based Watermarking Techniques". 2008 International Conference on Computational Intelligence for Modelling Control & Automation. pp. 140–145. doi:10.1109/CIMCA.2008.53. ISBN978-0-7695-3514-2. S2CID8927498.
Khan, Asifullah; Mirza, Anwar M. (October 2007). "Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding". Information Fusion. 8 (4): 354–365. CiteSeerX10.1.1.708.9509. doi:10.1016/j.inffus.2005.09.007. ISSN1566-2535.
Khan, Asifullah; Mirza, Anwar M. (October 2007). "Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding". Information Fusion. 8 (4): 354–365. CiteSeerX10.1.1.708.9509. doi:10.1016/j.inffus.2005.09.007. ISSN1566-2535.
Halder, Raju; Pal, Shantanu; Cortesi, Agostino (2010). "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison". Journal of Universal Computer Science. 16 (21): 3164–3190. CiteSeerX10.1.1.368.1075.
semanticscholar.org
api.semanticscholar.org
Zigomitros, Athanasios; Papageorgiou, Achilleas; Patsakis, Constantinos (2012). "Social network content management through watermarking". 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. pp. 1381–1386. doi:10.1109/TrustCom.2012.264. ISBN978-1-4673-2172-3. S2CID17845019.
Rowayda, A. Sadek (2008). "Blind Synthesis Attack on SVD Based Watermarking Techniques". 2008 International Conference on Computational Intelligence for Modelling Control & Automation. pp. 140–145. doi:10.1109/CIMCA.2008.53. ISBN978-0-7695-3514-2. S2CID8927498.
BLYTHE, Paul; FRIDRICH, Jessica (August 2004). "Secure digital camera"(PDF). Digital Forensic Research Workshop: 11–13. Archived(PDF) from the original on 2010-06-10. Retrieved 23 July 2018.
Khan, Asifullah; Mirza, Anwar M. (October 2007). "Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding". Information Fusion. 8 (4): 354–365. CiteSeerX10.1.1.708.9509. doi:10.1016/j.inffus.2005.09.007. ISSN1566-2535.