1. Andrés, M. E. , Bordenabe, N. E. , Chatzikokolakis, K. , and Palamidessi, C. (2012). Geo-indistinguishability: Differential privacy for location-based systems. CoRR, abs/1212.1984.
2. Asad, M. , Gilani, J. , and Khalid, A. (2011). An enhanced least significant bit modification technique for audio steganography. In Proc. Int. Conf. Comp. Netw. Inf. Tech., pages 143–147.
3. Ayday, E. , Raisaro, J. L. , Hubaux, J. , and Rougemont, J. (2013). Protecting and evaluating genomic privacy in medical tests and personalized medicine. In Proc. 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES’ 13, pages 95–106. IEEE Computer Society Press.
4. Ayday, E. , Yilmaz, E. , and Yilmaz, A. (2019). Robust optimization-based watermarking scheme for sequential data. In Proc. 22nd Int. Symp. Res. Attacks, Intrusions, Defenses, RAID’ 19, pages 323–336, Beijing, China. USENIX Assoc.
5. Barni, M. and Bartolini, F. (2004). Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, 1 edition.