1. Allen M. HSBC and Falciani: How it happened [Internet]. 2015. Available from: http://www.swissinfo.ch/eng/swiss‐leaks‐scandal_hsbc‐and‐falciani‐‐how‐it‐happened/41263376 [Accessed: 1 March, 2016]
2. Rogers S. Wikileaks embassy cables: Download the key data and see how it breaks [Internet]. December 3, 2010. Available from: http://www.theguardian.com/news/datablog/2010/nov/29/wikileaks‐cables‐data [Accessed: 1 March 2016]
3. Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert F‐A, Roux C. Watermarking medical images with anonymous patient identification to verify authenticity. Studies in Health Technology and Informatics. 2008;136:667-672
4. Bouslimi D, Coatrieux G, Cozic M, and Roux C. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine. 2012;16(5):891-899
5. Agrawal R, Kiernan J. Watermarking relational databases. In Proceedings of the 28th international conference on Very Large Data Bases (VLDB ‘02). VLDB Endowment. pp. 155-166