[1] P. Mitra and R. Gunjan, “A Statistical Property Based Image Watermarking Using Permutation and CT-QR,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6, 2013.
[2] N. Dey, P. Maji, P. Das, S. Biswas, A. Das, and S. S. Chaudhui, “An Edge Based Blind Watermarking Technique of Medical Images Without Devalorizing Diagnostic Parameters,” International Conference on Advances in Technology and Engineering (ICATE), pp. 1-5, 2013.
[3] M. K. Dutta, A. Singh, and T. A. Zia, “An Efficient and Secure Digital Image Watermarking Using Features From Iris Image,” International Conference on Control Communication and Computing (ICCC), pp. 451-456, 2013.
[4] Y. Wang, X. Bai, and S. Yan, “Digital Image Watermarking Based on Texture Block and Edge Detection in the Discrete Wavelet Domain,” International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), pp. 170-174, 2013.
[5] V. C. Prasad and S. Maheswari, “Robust Watermarking of AES Encrypted Images for DRM Systems,” International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), pp. 189-193, 2013.
[6] J. J. Shen and K. T. Liu, “A Novel Approach by Applying Image Authentication Technique on a Digital Document,” International Symposium on Computer, Consumer and Control (IS3C), pp. 119-122, 2014..
[7] C. H. Chen, Y. L. Tang, and W. S. Hsieh, “Color Image Authentication and Recovery via Adaptive Encoding,” International Symposium on Computer, Consumer and Control (IS3C), pp. 272-275, 2014.
[8] C. M. Wu, “Multi-level Tamper Detection and Recovery with Tamper Type Identification,” The 20th IEEE International Conference on Image Processing (ICIP), pp. 4512-4516, 2013.
[9] T. Jassim, R. Abd-Alhameed, and H. Al-Ahmad, “A New Robust and Fragile Watermarking Scheme for Images Captured by Mobile Phone Cameras,” The 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1-5, 2013.
[10] X. Qi, and Y. Liu, “Cloud Model Based Zero-watermarking Algorithm for Authentication of Text Document,” The 9th International Conference on Computational Intelligence and Security (CIS), pp. 712-715, 2013.
[11] Y. Huo, H. He, and F. Chen, “Semi-fragile Watermarking Scheme with Discriminating General Tampering from Collage Attack,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 1-6, 2013.
[12] N. V. Dharwadkar and B. B. Amberker, “An Adaptive Gray-Scale Image Watermarking Scheme Using Smooth and Edge Areas of an Image,” International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 66-71, 2013.
[13] D. A. Zende and M. K. Chavan, “Binary Image Authentication Using Zig-zag Ordering of Watermark,” International Conference on Advances in Technology and Engineering (ICATE), pp. 1-5, 2013.
[14] C. Li and Z. Qin, “A Blind Digital Image Watermarking Algorithm Based on DCT,” IET International Conference on Smart and Sustainable City 2013 (ICSSC 2013), pp. 446-448, 2013.
[15] R. Ohura and T. Minamoto, “A Recoverable Visible Digital Image Watermarking Based on the Dyadic Lifting Scheme,” The 11th International Conference on Information Technology: New Generations (ITNG), pp. 447-452, 2014.
[16] M. Alkhathami, F. Han, and R. V. Schyndel, “Fingerprint Image Protection Using Two Watermarks Without Corrupting Minutiae,” The 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1151-1155, 2013.
[17] P. C. Su, Y. C. Chang, and C. Y. Wu, “Geometrically Resilient Digital Image Watermarking by Using Interest Point Extraction and Extended Pilot Signals,” IEEE Transactions on Information Forensics and Security, pp. 1897-1908, 2013.
[18] X. Li, and J. Li, “Research on Image Digital Watermarking Based on Wavelet Transform and Grey Relational Analysis,” The 10th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 162-166, 2013.
[19] R. Zhang and Y. Wang, “Scrambling Image Watermark Algorithm Based on DCT and HVS,” International Conference on Information Technology and Applications (ITA), pp. 54-57, 2013.
[20] M. K. Dutta, A. Singh, K. M. Soni, R. Burget, and K. Riha, “Watermark Generation from Fingerprint Features for Digital Right Management Control,” The 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 717-721, 2013.
[21] S. A. Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,” Technical Report WAVES-TR-ECE802.602, Michigan State University, 2003.
[22] 吳秉澤,「JPEG影像的竄改偵測機制」,大同大學資訊工程學系碩士班碩士論文,2010年。[23] R. C. Gonzalez and R. E. Woods, “Digital Image Processing,” 3rd Edition, August 2007.
[24] B. Chen and G. W. Wornell, “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Transaction on information Theory, Vol. 47, No. 4, pp. 1423-1443, May 2011.