1. Avcibas I., Bayram S., Memon N., Ramkumar M., Sankur B., 2004.: “A classifier design for detecting image manipulations ,"in Proc. Int. Conf. Image Processing, Singapore, Vol.4, 2645-2648.
2. Bespalov D.A., 2006.: Natural parallelism of fast algorithms of wavelet transformation //Izvestiya TRTU. – 200.
3. Byelozerov E.V., 2011.: Method of revealing of digital media-data modifications on the basis of adaptive wavelet filtrations usage // Herald V. Dahl East-Ukrainian National University. – № 7 (161). P.1. – 15-21. (in Russian).
4. Byelozerov E.V., Rybalskiy O.V., Solovyov V.I., Bruhanova Y.A., 2010.: Methodology of signal gram authenticity checking by revealing of self-similar structures //Information safety. – №2 –35-49. (in Russian).
5. Byelozerov E.V., Solovyov V.I., Bruhanova Y.A., 2010.: Method of authenticity images estimation on the basis of the analysis of their spectral characteristics // Herald of V. Dahl East – Ukrainian National University. – №4 (146). P.1. – 179–184. (in Russian).
6. Byelozorov E.V., 2013.: Model to reveal the singularities of a digital graphical signal for finding out of its recording // Herald V. Dahl EUNU. – Lugansk, V. Dahl EUNU. - №6 (195), P.1. – 67–71. (in Russian).
7. Farid H., 2009.: “A survey of image forgery detection,” IEEE Signal Processing Magazine, V. 2, № 26, 16–25.
8. Fridrich J., Soukal D., Lukґas J., 2003.: “Detection of copy-move forgery in digital images,"in Digital Forensics Research Workshop.
9. Harten A., 1993.: Discrete multiresolution analysis and generalized wavelets. //J.App.Num.Math. – V.12. – 153-193.
10. Kobozeva A.A., 2008.: General approach to the analysis of information objects state based on the indignation theory //Herald of V. Dahl East-Ukrainian National University. – Lugansk, № 8, P.1, – 72– 81. (in Russian).
11. Li G., Wu Q., Tu D., Sun S., 2007.: "A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries based on DWT and SVD", in Proceedings of IEEE International Conference on Multimedia and Expo, Beijing China, July 2-5, 1750-1753.
12. McKay C. E., Swaminathan A., Gou H., Wu M., 2008.: “Image acquisition forensics: Forensic analysis to indentify imaging source" in Proc. IEEE Conf. Acoustic, Speech, and Signal Processing, Las Vegas, NV, 1657-1660.
13. Myna A. N., Venkateshmurthy M. G., Patil C. G., 2007.: Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping, in: International Conference on Computational Intelligence and Multimedia Applications, Sivakasi, India, 371-377.
14. Popescu A., Farid H., 2004.: Exposing digital forgeries by detecting duplicated image regions. //Dartmouth College, Tech. Rep. – TR2004-515. – 24-32.
15. Rybalskiy O.V., 2006.: Main theoretical statements to reveal the traces of phonogram digital processing and peculiarities of its programmed and methodic realization in the expertise of materials and video-sound recording means. (part 1) // Information protection. – K., № 1. – 71-76. (in Russian).
16. Rybalskiy O.V., Zharikov Yu.F., 2003.: Modern methods to test the authenticity of magnetic phonograms in forensic-acoustic expertise. – K.: NAVSU. – 300. (in Russian).
17. Sieriebriak K., 2012.: Information technologies in Ukraine: problems and obstacles Tеka. Commission of motorization and energetics in agriculture – V.12, № 3, 128-135.
18. Voronova A., 2011.: Information technologies in public administration practice. TEKA, Commision of Motorization and Power Industry in agriculture, Lublin University of technology, Volodymyr Dahl East- Ukrainian National University of Lugansk, Volume XD, Lublin, 313-318.
19. Ye S., Sun Q., Chang E., 2007.: “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,"in IEEE International Conference on Multimedia and Expo, 12-15.
20. Zhu B., Swanson M.D., Tewfik A.H., 2004.: “When seeing isn’t believing [multimedia authentication technologies],” //IEEE Signal Processing Magazine - Mar. – V. 21, № 2. – 40-49.