F. Bartolini, A. Tefas, M. Barni, and I. Pitas, Image authentication techniques for surveillance applications, Proceedings of the IEEE, vol.89, issue.10, 2004.
DOI : 10.1109/5.959338

C. Rey and J. Dugelay, A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.6, pp.613-621, 2002.
DOI : 10.1155/S1110865702204047

T. E. Boult, PICO: Privacy through Invertible Cryptographic Obscuration, Computer Vision for Interactive and Intelligent Environment (CVIIE'05), 2005.
DOI : 10.1109/CVIIE.2005.16

C. Lin and S. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. On Circuits and Systems of Video Technology, vol.11, issue.2, pp.153-168, 2001.

Q. B. Sun, S. F. Chang, M. Kurato, and M. Suto, A new semi-fragile image authentication framework combining ECC and PKI infrastructure, p.2, 2002.

K. Gopal and M. Latha, Watermarking of Digital Video Stream for Source Authentication, IJCSI International Journal of Computer Science Issues, vol.7, issue.4 1, 2010.

J. Le-guen and C. Bernier, Utilisation des wifibots, 2007.

C. Wen and K. Yang, Image authentication for digital image evidence, Forensic Science Journal, vol.5, pp.1-11, 2006.

. K. Thamodaran and K. Kuppusamy, A Noval Security Mechanism for Image Authentication and Copyright Protection, International Journal of Computer Applications, 2010.

A. Benhocine, L. Laouamer, L. Nana, and A. Pascu, A New Approach against Color Attacks of Watermarked Images, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.969-972, 2008.
DOI : 10.1109/IIH-MSP.2008.134