|| B.B. Zhu, M.D. Swanson, and A.H. Tewfik, "When seeing isn't believing [multimedia authentication technologies]," IEEE Signal Processing Magazine, vol.21, no.2, pp. 40-49, Mar 2004.|
 F. Bartolini, A. Tefas, M. Barni, and I. Pitas, "Image authentication techniques for surveillance applications," Proceedings of the IEEE, vol.89, no.10, pp.1403-1418, Oct 2001.
 T. Wiegand, G.J. Sullivan, G. Bjntegaard, and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.7, pp. 560-576, July 2003.
 Wallace, K. Gregory, "The JPEG Still Picture Compression Standard," Communications of the ACM, vol. 34, no. 4, pp. 30-44, April 1991.
 ISO/IEC, MPEG Standard, http://www.mpeg.org,1998.
 ISO/IEC International Standard 13818-2-2:1995.
 ISO/IEC International Standard 14496-2:2001.
 I. E. G. Richardson, H.264 and MPEG-4 Video Compression Video Coding for Next-generation Multimedia, John Wiley & Sons Ltd, UK, 2003.
 JVT, Draft ITU-T Recommendation and Final Draft International Standard, Pattaya, Tailand, 2003.
 A. Hallapuro, M. Karczewicz and H. Malvar, “Low Complexity Transform and Quantization-Part I: Basic Implementation,” Joint Video Team of ISO/IEC MPEG & ITU-T VCEG Document, Jan 2002.
 W. Diffie, and M.E. Hellman, ”New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no.6, pp.644-654, 1976.
 A. Gersho and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, USA, 1992.
 C. S. Lu, Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing, PA, USA, 2005.
 Y Linde, A. Buzo, and R.M Gray, ”An algorithm for vector quantizer design,” IEEE Trans. on Communications, vol.28, pp.84-95, 1980.
 I. Katsavounidis, C. C. Kuo, and Z. Zhang, "A new initialization technique for generalized Lloyd iteration," IEEE Signal Processing Letters, vol.1, no.10, pp.144-146, Oct 1994.
 M. M. Yeung, F. Mintzer, "An invisible watermarking technique for image verification," International Conference on Image Processing, vol.2, pp.680-683, Oct 1997.
 J. Fridrich, "Methods for tamper detection in digital images," Proc. Multimedia and Security Workshop at ACM Multimedia, 1999.
 J. Fridrich, M. Goljan, A.C. Baldoza, "New fragile authentication watermark for images," International Conference on Image Processing, vol.1, pp.446-449, 2000.
 G. Frideman, “The trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transatctions on Consumer Electronics, vol. 39, pp.905-910, Novemeber 1993.
 P.W. Wong,“ A public key watermark for image verification and authentication,” Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp.455-459, October 1998.
 P.W. Wong, “A watermark for image integrity and ownership verification,” in Proc. IS&T PIC Conf., May 1998.
 M. Wu and B. Liu, “Watermarking for image authentication,” Proceeding of the IEEE International Conference on Image Processing, vol. 2, pp. 437-441, October 1998.
 S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs Journal, vol. 20, no.4, pp. 18-26, April 1995.
 C. Y. Lin and S. F. Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content," SPIE Security and Watermarking of Multimedia Contents II, Jan. 2000.
 C. Y. Lin and S. F. Chang, "Issues and Solutions for Authenticating MPEG Video," SPIE Security and Watermarking of Multimedia Contents, Jan. 1999.
 C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Surviving JPEG Lossy Compression," SPIE Storage and Retrieval of Image/Video Database, Jan 1998.
 C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," CU/CTR Technical Report 486-97-19, Dec. 1997.
 A. Pramateftakis, T. Oelbaum, and K. Diepold, "Authentication of MPEG-4-based surveillance video," International Conference on Image Processing, vol.1, pp. 33- 37, Oct. 2004
 R. Du, and J. Fridrich, "Lossless authentication of MPEG-2 video," Proceeding of IEEE International Conference on Image Processing, vol.2, pp. 893-896, 2002.
 C. Y. Lin and S. F. Chang, “SARI: Self-Authentication-and-Recovery Image Watermarking System,” ACM Multimedia , Sept. 2001.
 T. Uehara, R. Safavi-Naini, and P. Ogunbona, "An MPEG tolerant authentication system for video data," IEEE International Conference on Multimedia and Expo, vol.2, pp. 891-894, June 2004.
 J. Wu, B.B. Zhu, S. Li, and F. Lin, "Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes," IEEE International Conference on Multimedia and Expo, vol.2, pp. 931- 934, June 2004.
 M. Holliman, and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol.9, no.3, pp.432-441, Mar 2000.
 R. Radhakrishnan, and N. Memon, "On the security of the digest function in the SARI image authentication system," IEEE Transactions on Circuits and Systems for Video Technology, vol.12, no.11, pp. 1030-1033, Nov 2002.
 J. Wu, B. B. Zhu, S. Li and F. Lin, “New Attacks on SARI Image Authentication System,” Proc. of SPIE, pp.602-609, 2004.
 Y. M. Y. Hasan, and A. M.Hassan, "Fragile blockwise image authentication thwarting vector quantization attack," Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, vol.1, pp. 530-533, Dec 2004.
 M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," Proceedings of IEEE International Conference on Image Processing, vol.2, pp.502-505, Oct 2001.
 D. He, Z. Huang, R. Ma, and Q. Sun, "Feature difference analysis in video authentication system," Proceedings of IEEE International Symposium on Circuits and Systems, vol.5, pp. 716-719, May 2004.
 A. H. Ouda, and M. R. El-Sakka, "Localization and security enhancement of block-based image authentication," IEEE International Conference on Image Processing, vol.1, pp. 673-679, Sept 2005.
 N. Otsu, “A threshold selection method from gray level histogram,” IEEE Trans. on Systems, Man, and Cybernetics, vol.8, pp.62-66, 1978.
 R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison-Wesley, NY, 1992.