A. Tiwari and M. Sharma, “Evaluation and Comparison of Semifragile Watermarking Methods for Image Authentication,” International Journal of Computational Intelligence and Information Security, Vol. 2, No. 8, 2011, pp. 36-42.
 X. Y. Wu, “Reversible Semi fragile Watermarking Based on Histogram Shifting of Integer Wavelet Coefficients,” Proceedings of IEEE International Conference on Signal Processing, 21-23 February 2007, pp. 501-505.
 C. M. Hwang, C. Y. Yang, P. Y. Chang and W.-C. Hu, “A Semifragile Reversible Data Hiding by Coefficient Bias Algorithm,” Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, 2009, pp. 132-139.
 Y. Q. Li, “Semifragile Watermarking Algorithm Based on Bi Watermarking Technology,” Proceeding of IEEE International Conference on Computer Applications and System Modelling, Vol. 15, 2010, pp. 138-142.
 Li Bo, “A New Semifragile Watermarking Algorithm for Image Authentication,” Proceedings of International Conference of World Congress on Intelligent Control and Automation, 25-27 June 2008, pp. 5928-5932.
 R. Chamlawi and C. T. Li, “Authentication and Recovery of Digital Images Potential Application in Video Surveillance and Remote Sensing,” Proceeding of IEEE International Conference, 10-14 January 2009, pp. 26-27.
 J. S. Ruiz and D. Magias, “DWT and TSVQ Based Semi Fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images,” Proceeding of IEEE International Symposium on Image and Video Technology, 14-17 November 2010, pp. 331-336.
 R. Bao, T. Q. Zhang, et al., “Semi-Fragile Watermarking Algorithm of Color Image Based on Slant Transform and Channel Coding,” Proceeding of IEEE International Conference on Image and Signal Processing, Vol. 2, 2011, pp. 1039-1043.
 N. Baziz, “A Novel Image Authentication Scheme Based on Contoured and Error Control Coding,” Proceedings of IEEE International Symposium on Signal Processing and Information System, 2006, pp. 34-39.
 K. Maeno, “New Semifragile Image Authentication Techniques Using Random Bias and Nonuniform Quantization,” IEEE Transactions on Multimedia, Vol. 8, No. 1, 2006, pp. 32-45. doi:10.1109/TMM.2005.861293
 Z.-M. Lu and D.-G. Xu, “Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization,” IEEE Transactions on Image Processing, Vol. 14, No. 6, 2005, pp. 822-832. doi:10.1109/TIP.2005.847324
 A. Piva and R. Caldelli, “Semifragile Watermarking for Still Images Authentication and Content Recovery,” International Workshop on Image Analysis for Multimedia Interactive Services, 21-23 April 2004, pp. 511-515.
 X. A. Zhu, “A Semi-Fragile Digital Watermarking Algorithm in Wavelet Transform Domain Based on Arnold Transform,” Proceedings of IEEE International Conference on Signal Processing, 26-29 October 2008, pp. 2217-2220.
 H. W. Lin and S. Q. Yang, “Watermark Algorithm for Color Image Authentication and Restoration,” Proceedings of IEEE International Conference on Electronic and Mechanical Engineering and Information Technology, 2011, pp. 2773-2776.
 J.-P. Boyer, P. Duhamel and J. Blanc-Talon, “Scalar DC- QIM for Semifragile Authentication,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 4, 2008, pp. 776-782. doi:10.1109/TIFS.2008.2004285
 O. Altun, G. Sharma and M. Bocko, “A Set Theoretic Framework for Watermarking and Its Applications to Semifragile Tamper Detection,” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, 2006, pp. 479-492. doi:10.1109/TIFS.2006.885018