C. Rey and J. L. Dugelay, A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.6, pp.613-621, 2002.
DOI : 10.1155/S1110865702204047

S. Suthaharan, Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, issue.16, pp.1893-1903, 2004.
DOI : 10.1016/j.patrec.2004.08.017

P. Lin, C. Hsieh, and P. Huang, A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, issue.12, pp.2519-2529, 2005.
DOI : 10.1016/j.patcog.2005.02.007

N. Merhav and E. Sabbag, Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, 2008.
DOI : 10.1109/TIT.2007.911210

URL : http://arxiv.org/abs/0705.1919

M. Celik, G. Sharma, E. Saber, and A. M. Tekalp, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.11, issue.6, pp.585-595, 2002.
DOI : 10.1109/TIP.2002.1014990

S. Suthaharan, Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, issue.16, pp.1893-1903, 2004.
DOI : 10.1016/j.patrec.2004.08.017

S. Liu, H. Yao, W. Gao, and Y. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol.185, issue.2, pp.869-882, 2007.
DOI : 10.1016/j.amc.2006.07.036

M. Wang and W. Chen, A majority-voting based watermarking scheme for color image tamper detection and recovery, Computer Standards & Interfaces, vol.29, issue.5, pp.561-570, 2007.
DOI : 10.1016/j.csi.2006.11.009

M. Yeung and F. Mintzer, Invisible watermarking for image verification, Journal of Electronic Imaging, vol.7, issue.3, pp.578-591, 1998.
DOI : 10.1117/1.482612

M. D. Swanson, Z. Bin, and A. H. Tewfik, Transparent robust image watermarking, Proceedings of 3rd IEEE International Conference on Image Processing, pp.211-214, 1996.
DOI : 10.1109/ICIP.1996.560421

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.3895

M. Holliman and N. Melon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000.
DOI : 10.1109/83.826780

H. J. He, J. S. Zhang, and H. X. Wang, Synchronous counterfeiting attacks on selfembedding watermarking schemes, Internetional Journal. Computer Science and Network Security, vol.6, issue.1, pp.251-257, 2006.

M. Tagliasacchi, G. Valenzise, and S. Tubaro, Hash-Based Identification of Sparse Image Tampering, IEEE Transactions on Image Processing, vol.18, issue.11, pp.2491-2504, 2009.
DOI : 10.1109/TIP.2009.2028251

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.6767

C. Lai and C. Tsai, Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition, IEEE Transactions on Instrumentation and Measurement, vol.59, issue.11, pp.3060-3063, 2010.
DOI : 10.1109/TIM.2010.2066770

A. Adelsbach, S. Katzenbeisser, and A. Sadegni, A Computational Model for Watermark Robustness, LNCS, vol.4437, pp.145-160, 2006.
DOI : 10.1007/978-3-540-74124-4_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.3791

X. Zhang and S. Wang, Fragile watermarking scheme using a hierarchical mechanism, Signal Processing, vol.89, issue.4, pp.675-679, 2009.
DOI : 10.1016/j.sigpro.2008.10.001

X. Zhu, A. Ho, and P. Marziliano, A new semi-fragile image watermarking with robust tampering restoration using irregular sampling, Signal Processing: Image Communication, vol.22, issue.5, pp.515-528, 2009.
DOI : 10.1016/j.image.2007.03.004

H. J. He, F. Chen, and H. Tai, Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.185-196, 2012.
DOI : 10.1109/TIFS.2011.2162950

R. Baeuml, J. J. Eggers, R. Tzschoppe, and J. Huber, Channel model for watermarks subject to desynchronization attacks, Proc. SPIE, Security and Watermarking of Multimedia Contents IV, pp.281-292, 2002.
DOI : 10.1117/12.465286

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.2408