1. Feng Bao, "Multimedia content protection by cryptography and watermarking in tamper-resistant hardware," Proceedings on ACM multimedia 2000 workshops, Los Angeles, CA U.S.A.(2000)
2. F. L. Bauer, "Decrypted Secrets─Methods and Maxims of Cryptology," Berlin, Heidelberg, Germany:Springer-Verlag (1997)
3. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding," IBM Systems Journal, Vol. 35 (1996)
4. Sushil Bhattacharjee and Martin Kutter, "Compression Tolerant Image Authentication," International Conference on Image Processing,pp. 435—439. (1998)
5. T.S. Chen, C.C. Chang and M.S. Hwang, "A Virtual Image Cryptosystem Based upon Vector Quantization," IEEE Transactions on Image Processing, Vol. 7, No. 10, pp.1485-1488 (1998)
6. N. Chotikakamthorn and W. Sangiamkun, " Digital Watermarking Technique for Image Authentication by Neighbouring Block Similarity Measure, " Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, Vol .2, pp.743-747 (2001)
7. I. J. Cox and J.-P. Linnartz, "Some general methods for tampering with watermarks", IEEE Journal on Selected Areas in Communications, pp.587—593.(1998)
8. Jiri Fridrich, "A Hybrid Watermaerk for Tamper Detection in Digital Images," ISSPA 99’, Brisbane, Australia(1999)
9. Jiri Fridrich, Miroslav Goljan, "Images with Self-Correcting Capabilities," International Conference on Image Processing, Vol. 3, pp. 792—796.(1999)
10. Chiou-Ting Hsu, Ja-Ling Wu, "Hidden Digital Watermarks in Images," IEEE Transactions on Image Processing, Vol. 8, No. 1(1999)
11. A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang and G. Wolfe, "Watermarking techniques for intellectual property protection," Proceedings of the 35th annual conference on Design automation conference, San Francisco, CA U.S.A.(1998)
12. Mohan S. Kankanhalli, K. R. Ramakrishnan and Rajmohan, "Content based watermarking of images," Proceedings of the sixth ACM international conference on Multimedia , Bristol United Kingdom.(1998)
13. Deepa Kundur and Dimitrios Hatzinakos, "Digital Watermarking for Telltale Tamper Proofing and Authentication," PROCEEDINGS OF THE IEEE, Vol.87, No.7 (1999)
14. Tse-Hua Lan and Ahmed H. Tewfik, "Fraud detection and self embedding," Proceedings of the seventh ACM international conference (part 2) on Multimedia , Orlando, FL U.S.A.(1999)
15. Jaejin Lee and Chee Sun Won, "A Watermarking Sequence Using Parties of Error Control Coding for Image Authentication and Correction," IEEE Transactions on Consumer Electronics,Vol. 46, No. 2, pp. 313—317 ( 2000)
16. Chang-Tsun Li, Der-Chyuan Lou and Tsung-Hsu Chen, " Image Authentication and Integrity Verification VIA Content-Based Watermarks and a Public Key Cryptosystem, " IEEE International Conference on Image Processing,Vol. 1, No. 3, pp.694-697 (2000)
17. D.C. Lou and J.L. Liu, "Fault Resilient and Compression Tolerant Digital Signature for Image Authentication," IEEE Transactions on Consumer Electronics, Vol. 46, pp. 31 —39 (2000)
18. Chun Shien Lu and Hong Yuan Mark Liao, "Multipurpose Watermarking for Image authentication and Protection," IEEE Transactions on Image Processing, Vol.10, No.10, pp.1579-1585 (2000)
19. Lisa M. Marvel and Charles T. Retter, "A Methodology for Data Hiding Using Images," Military Communications Conference, MILCOM 98, Proceedings, IEEE, Vol.3, pp.1044—1047 ( 1998)
20. Lisa M. Marvel, Charles G. Boncelet and Charles T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, Vol.8, No.8 (1999)
21. Nasir Memon and Ping Wah Wong, "Protecting Digital Media Content," Communication of The ACM, Vol.41, No.7. (1998)
22. Fabien A.P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, "Information Hiding--A Survey," Proceedings of the IEEE, Vol.87, No.7 (1999)
23. Maria Paula Queluz, "Towards Robust, Content Based Techniques for Image Authentication," IEEE Second Workshop on Multimedia Signal Processing, pp. 297—302 (1998)
24. Marc Schneider and Shih-Fu Chang, "A Robust Content Based Digital Signature for Image Authentication," International Conference on Image Processing,Vol.3, pp.227—230 (1996)
25. C.E. Shannon, "Communication in the presence of noise", Procedings of Institute of Radio Engineers, pp.10—21 ( 1949)
26. Mitchell D. Swanson, Mei Kobayashi, and Ahmed H. Tewfik, "Multimedia Data-embedding and Watermarking Technologies," Proceedings of the IEEE, Vol.86, No.6, pp. 1064—1087 (1998)
27. Anastasios Tefas and Ioannis Pitas, "Image Authentication Using Chaotic Mixing System," IEEE International Symposium on Circuits and Systems, Geneva, Switzerland.(2000)
28. Min-Jen Tsai, Kuang-Yao Yu and Yi-Zhang Chen, " Wavelet packet and adaptive spatial transformation of watermark for digital image authentication," IEEE International Conference on Image Processing, Vol. 1, pp.450-453 (2000)
29. Steve Walton, "Image authentication for a slippery new age," Dr. Dobb’s Journal (1995)
30. Ping Wah Wong, "A Public key watermark for Image Verification and Authentication," International Conference on Image Processing,pp. 455—459 (1998)
31. Ping Wah Wong and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, " IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1593 —1601 (2001)
32. Min Wu, Bede Liu, "Watermarking for Image Authentication," IEEE International Conference on Image Processing,Vol.2, pp.437— 441 ( 1998)
33. Liehua Xie and Gonzalo R. Arce, "Joint Wavelet Compression and Authentication Watermarking," International Conference on Image Processing, Vol.2, pp.427—431 (1998)
34. C. R. Yang, M. S. Hwang, Y. L. Tang, “偵測影像的被破壞點之研究--縱橫偵測法", Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Nov. 1999.
35. M. Yeung, and F. Mintzer, "An Invisible Watermarking Technique for Image Verification," Proc. ICIP''97, Santa Barbara, California( 1997)
36. 李遠坤,陳玲慧,「數位影像之資訊隱藏技術探討」,資訊安全通訊,第五卷第四期(1999)。37. 莊潤洲,「影像被竄改之偵測技術研究」,碩士論文,中正大學資訊工程研究所,嘉義(2000)。38. 楊清榮,「影像完整性之研究」,碩士論文,朝陽科技大學資訊管理研究所,台中(2000)。39. 蔡昌隆, 陳建儒, 江惠芬, 范國清, 「內嵌式資料隱藏之探討」,電腦學刊,第三卷第一期(2001)。