10 \citation{1411349,Xie09:BASecurity}
13 \citation{guyeux13:bc}
14 \citation{guyeux13:bc}
16 \@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}}
17 \newlabel{sec:introduction}{{1}{2}}
22 \@writefile{toc}{\contentsline {section}{\numberline {2}Notations and Terminologies}{3}}
23 \newlabel{not}{{2}{3}}
25 \@writefile{toc}{\contentsline {subsection}{\numberline {2.1}The mathematical theory of chaos}{4}}
26 \@writefile{thm}{\contentsline {Def}{{Definition}{1}{}}{4}}
27 \@writefile{thm}{\contentsline {Def}{{Definition}{2}{}}{4}}
28 \@writefile{thm}{\contentsline {Def}{{Definition}{3}{}}{4}}
29 \@writefile{thm}{\contentsline {Def}{{Definition}{4}{Devaney's chaos}}{4}}
30 \@writefile{thm}{\contentsline {Def}{{Definition}{5}{}}{4}}
31 \newlabel{sensitivity}{{5}{4}}
32 \@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Chaotic iterations and watermarking scheme}{4}}
33 \newlabel{sec:chaotic iterations}{{2.2}{4}}
38 \citation{gfb10:ip,bcg11b:ip}
39 \@writefile{thm}{\contentsline {Def}{{Definition}{6}{}}{5}}
40 \newlabel{Def:chaotic iterations}{{6}{5}}
42 \@writefile{thm}{\contentsline {Th}{{Theorem}{1}{}}{5}}
43 \citation{gfb10:ip,bcg11b:ip}
44 \citation{guyeux10ter}
47 \@writefile{toc}{\contentsline {section}{\numberline {3}The $\mathcal {CIW}_1$ Chaotic Iteration based Watermarking Process}{6}}
48 \newlabel{sec:ciw1}{{3}{6}}
49 \@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Using chaotic iterations as information hiding schemes}{6}}
50 \newlabel{sec:data-hiding-algo-chaotic iterations}{{3.1}{6}}
51 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Presentation of the dhCI process}{6}}
52 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Most and least significant coefficients}{6}}
53 \newlabel{sec:msc-lsc}{{3.1.2}{6}}
54 \@writefile{thm}{\contentsline {Def}{{Definition}{7}{}}{6}}
55 \@writefile{thm}{\contentsline {Ex}{{Example}{1}{}}{6}}
56 \newlabel{Exemple LSC}{{1}{6}}
57 \@writefile{thm}{\contentsline {Def}{{Definition}{8}{}}{6}}
58 \newlabel{def:msc,lsc}{{8}{6}}
59 \citation{guyeux10ter}
61 \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Most and least significant coefficients of Lena.}}{7}}
62 \newlabel{fig:MSCLSC}{{1}{7}}
63 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Presentation of the $\mathcal {CIW}_1$ dhCI scheme}{7}}
64 \newlabel{trucMachin}{{3.1.3}{7}}
68 \newlabel{invad}{{2(b)}{8}}
69 \newlabel{sub@invad}{{(b)}{8}}
70 \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Data hiding with chaotic iterations}}{8}}
71 \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Original Lena.}}}{8}}
72 \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Watermark.}}}{8}}
73 \@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Watermarked Lena.}}}{8}}
74 \newlabel{fig:DWT}{{2}{8}}
75 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Examples of strategies}{8}}
76 \newlabel{sec:ciis-cids-example}{{3.1.4}{8}}
77 \@writefile{toc}{\contentsline {paragraph}{CIIS strategy}{8}}
78 \@writefile{thm}{\contentsline {Def}{{Definition}{9}{PLCM}}{8}}
79 \newlabel{Def:PLCM}{{9}{8}}
80 \newlabel{eq:PLCM-for-strategy}{{3.1.4}{8}}
82 \citation{Perez-Freire06}
83 \citation{Kalker2001,ComesanaPP05bis}
88 \newlabel{sec:cids-example}{{3.1.4}{9}}
89 \@writefile{toc}{\contentsline {paragraph}{CIDS strategy}{9}}
90 \@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Security versus robustness}{9}}
91 \newlabel{sec:chaotic iterations-security-level}{{3.2}{9}}
92 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.1}Presentation}{9}}
93 \@writefile{thm}{\contentsline {Def}{{Definition}{10}{Security~\cite {Kalker2001}}}{9}}
94 \newlabel{def:security}{{10}{9}}
95 \@writefile{thm}{\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{9}}
96 \newlabel{def:robustness}{{11}{9}}
97 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Classification of attacks}{9}}
98 \newlabel{sec:attack-classes}{{3.2.2}{9}}
99 \@writefile{thm}{\contentsline {Def}{{Definition}{12}{}}{9}}
100 \citation{Kalker2001}
104 \citation{Cachin2004}
106 \@writefile{thm}{\contentsline {Def}{{Definition}{13}{}}{10}}
107 \@writefile{thm}{\contentsline {Def}{{Definition}{14}{}}{10}}
108 \@writefile{thm}{\contentsline {Def}{{Definition}{15}{}}{10}}
109 \@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Watermarking attacks classification in context of\nobreakspace {}\cite {Kalker2001}}}{10}}
110 \newlabel{table:attack-classification}{{1}{10}}
111 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Definition of stego-security}{10}}
112 \newlabel{sec:stego-security-definition}{{3.2.3}{10}}
113 \@writefile{thm}{\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{10}}
114 \newlabel{Def:Stego-security}{{16}{10}}
119 \@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Security evaluation}{11}}
120 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Evaluation of the stego-security}{11}}
121 \newlabel{sec:stego-security-proof}{{3.3.1}{11}}
122 \@writefile{thm}{\contentsline {Prop}{{Proposition}{1}{}}{11}}
123 \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Evaluation of the topological security}{11}}
124 \newlabel{sec:topological security-evaluation}{{3.3.2}{11}}
125 \@writefile{thm}{\contentsline {Def}{{Definition}{17}{}}{11}}
126 \newlabel{Def:topological security-definition}{{17}{11}}
127 \@writefile{thm}{\contentsline {Prop}{{Proposition}{2}{}}{11}}
128 \@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Comparison between spread-spectrum and chaotic iterations}{11}}
129 \newlabel{sec:comparison-application-context}{{3.4}{11}}
131 \citation{Guyeux2012}
134 \citation{GuyeuxThese10}
138 \@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Lyapunov exponent evaluation}{12}}
139 \@writefile{toc}{\contentsline {section}{\numberline {4}The $\mathcal {CIS}_2$ Chaotic Iteration based Steganographic Process}{12}}
140 \newlabel{sec:secrypt11}{{4}{12}}
141 \@writefile{toc}{\contentsline {subsection}{\numberline {4.1}The improved algorithm}{12}}
142 \newlabel{section:Algorithm}{{4.1}{12}}
143 \newlabel{section:IH based on CIs}{{4.1}{12}}
144 \newlabel{sec:topological}{{4.1}{12}}
145 \@writefile{thm}{\contentsline {Def}{{Definition}{18}{}}{12}}
146 \newlabel{def:strategy-adapter}{{18}{12}}
152 \@writefile{thm}{\contentsline {Def}{{Definition}{19}{}}{13}}
153 \@writefile{thm}{\contentsline {Def}{{Definition}{20}{}}{13}}
154 \@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security study of the $\mathcal {CIS}_2$}{13}}
155 \@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}Stego-security}{13}}
156 \@writefile{thm}{\contentsline {Prop}{{Proposition}{3}{}}{13}}
157 \@writefile{thm}{\contentsline {Pre}{{Proof}{1}{}}{13}}
163 \citation{bcfg+13:ip}
164 \@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Topological security}{14}}
165 \@writefile{toc}{\contentsline {paragraph}{Topological model}{14}}
166 \@writefile{thm}{\contentsline {Prop}{{Proposition}{4}{}}{14}}
167 \@writefile{toc}{\contentsline {paragraph}{A new distance on $\mathcal {X}_2$}{14}}
168 \@writefile{toc}{\contentsline {paragraph}{Continuity of $\mathcal {CIS}_2$}{14}}
169 \@writefile{thm}{\contentsline {Prop}{{Proposition}{5}{}}{14}}
170 \newlabel{section:chaos-security}{{4.2.2}{14}}
171 \@writefile{toc}{\contentsline {paragraph}{$\mathcal {CIS}_2$ is chaotic}{14}}
172 \@writefile{thm}{\contentsline {Th}{{Theorem}{2}{}}{14}}
173 \newlabel{theo:chaotic}{{2}{14}}
174 \citation{bcfg+13:ip}
175 \citation{rifq/others03}
176 \@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Correctness and completeness studies}{15}}
177 \newlabel{sub:ci2:discussion}{{4.3}{15}}
178 \@writefile{thm}{\contentsline {Prop}{{Proposition}{6}{}}{15}}
179 \@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Deciding whether a possibly attacked media is watermarked}{15}}
180 \newlabel{sub:ci2:distances}{{4.4}{15}}
181 \citation{bcfg+13:ip}
182 \citation{bcfg+13:ip}
183 \citation{bcfg+13:ip}
185 \citation{bcfg+13:ip}
186 \citation{bcfg+13:ip}
187 \@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Robustness study of the process}{16}}
188 \newlabel{Fig:atq:dec:curves}{{4.5}{16}}
189 \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Cropping Results}}{16}}
190 \newlabel{Fig:atck:dec}{{3}{16}}
191 \citation{bcfg+13:ip}
192 \newlabel{Fig:atq:jpg:curves}{{4(a)}{17}}
193 \newlabel{sub@Fig:atq:jpg:curves}{{(a)}{17}}
194 \newlabel{Fig:atq:jp2:curves}{{4(b)}{17}}
195 \newlabel{sub@Fig:atq:jp2:curves}{{(b)}{17}}
196 \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Compression Results}}{17}}
197 \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{17}}
198 \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{17}}
199 \newlabel{Fig:atck:comp}{{4}{17}}
200 \newlabel{Fig:atq:rot:curve}{{4.5}{17}}
201 \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Rotation Attack Results}}{17}}
202 \newlabel{Fig:atq:rot}{{5}{17}}
203 \citation{bcfg+13:ip}
204 \newlabel{Fig:atq:lsb:curve}{{6(a)}{18}}
205 \newlabel{sub@Fig:atq:lsb:curve}{{(a)}{18}}
206 \newlabel{Fig:atq:ci2:curve}{{6(b)}{18}}
207 \newlabel{sub@Fig:atq:ci2:curve}{{(b)}{18}}
208 \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces LSB Modifications}}{18}}
209 \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB erasing effects}}}{18}}
210 \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying algorithm twice}}}{18}}
211 \newlabel{Fig:atq:lsb}{{6}{18}}
212 \@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Evaluation of the embeddings}{18}}
213 \newlabel{sub:roc}{{4.6}{18}}
214 \@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{18}}
215 \newlabel{fig:roc:dwt}{{7}{18}}
219 \@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Lyapunov evaluation of $\mathcal {CIS}_2$}{19}}
220 \newlabel{sec:lyapCIS2}{{4.7}{19}}
221 \@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.1}A topological semi-conjugacy between $\mathcal {X}_2$ and $\mathds {R}$}{19}}
222 \newlabel{sec:topological-semiconjugacy}{{4.7.1}{19}}
223 \@writefile{thm}{\contentsline {Def}{{Definition}{21}{}}{19}}
224 \newlabel{def:psi-function}{{21}{19}}
225 \@writefile{thm}{\contentsline {Def}{{Definition}{22}{}}{19}}
227 \@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Some values for $\psi $\nobreakspace {}(see Definition\nobreakspace {}21\hbox {}).}}{20}}
228 \newlabel{tablePsi}{{2}{20}}
229 \@writefile{thm}{\contentsline {Def}{{Definition}{23}{}}{20}}
230 \newlabel{def:e et s}{{23}{20}}
231 \@writefile{thm}{\contentsline {Def}{{Definition}{24}{}}{20}}
232 \newlabel{def:function-g-on-R}{{24}{20}}
236 \@writefile{thm}{\contentsline {Def}{{Definition}{25}{}}{21}}
237 \@writefile{thm}{\contentsline {Prop}{{Proposition}{7}{}}{21}}
238 \@writefile{thm}{\contentsline {Th}{{Theorem}{3}{}}{21}}
240 \citation{Formenti1998}
244 \@writefile{thm}{\contentsline {Prop}{{Proposition}{8}{}}{22}}
245 \newlabel{Prop:derivabilite-de-g}{{8}{22}}
246 \@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.2}Topological security of $\mathcal {CIS}_2$ on $\mathds {R}$}{22}}
247 \newlabel{section:topo-secu-cis2-R}{{4.7.2}{22}}
248 \@writefile{thm}{\contentsline {Th}{{Theorem}{4}{}}{22}}
249 \newlabel{theo:chaos-and-fineness}{{4}{22}}
250 \@writefile{thm}{\contentsline {Th}{{Theorem}{5}{}}{22}}
251 \newlabel{th:cis2-topo-order}{{5}{22}}
255 \citation{bcfg12a:ip,bcfg12b:ip}
258 \citation{bcfg12a:ip}
259 \citation{bcfg12b:ip}
260 \citation{DBLP:conf/ih/SolankiSM07}
261 \citation{DBLP:conf/mmsec/FridrichPK07}
262 \citation{DBLP:conf/ih/KimDR06}
263 \citation{DBLP:conf/ih/PevnyFB10}
264 \@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.3}Evaluation of the Lyapunov exponent}{23}}
265 \newlabel{section:lyapunov-exponent-evaluation}{{4.7.3}{23}}
266 \@writefile{thm}{\contentsline {Th}{{Theorem}{6}{}}{23}}
267 \@writefile{thm}{\contentsline {Rem}{{Rem}{1}{}}{23}}
268 \@writefile{toc}{\contentsline {section}{\numberline {5}The $\mathcal {DI}_3$ Steganographic Process}{23}}
269 \newlabel{di3sec}{{5}{23}}
270 \citation{bcfg12a:ip}
271 \citation{bcfg12b:ip}
272 \citation{bcfg12a:ip}
273 \@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Mathematical definitions and notations}{24}}
274 \newlabel{sec:math-def}{{5.1}{24}}
275 \@writefile{thm}{\contentsline {Def}{{Definition}{26}{}}{24}}
276 \@writefile{thm}{\contentsline {Def}{{Definition}{27}{}}{24}}
277 \newlabel{def:injective-sequence}{{27}{24}}
278 \@writefile{toc}{\contentsline {subsection}{\numberline {5.2}The new $\mathcal {DI}_3$ process}{24}}
279 \newlabel{sec:new-process-di-1}{{5.2}{24}}
280 \@writefile{thm}{\contentsline {Rem}{{Rem}{2}{}}{24}}
281 \@writefile{thm}{\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{24}}
282 \newlabel{def:process-DI-1}{{28}{24}}
283 \citation{bcfg12a:ip}
284 \citation{junod1999cryptographic}
285 \citation{prng-Blum-goldwasser}
286 \citation{Jenkins1996}
287 \citation{bcfg12a:ip}
288 \citation{bcfg12b:ip}
289 \citation{bcfg12a:ip}
290 \@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Security study}{25}}
291 \@writefile{thm}{\contentsline {Prop}{{Proposition}{9}{}}{25}}
292 \citation{bcfg12a:ip}
293 \citation{bcfg12b:ip}
294 \citation{bcfg12a:ip}
295 \citation{DBLP:conf/ih/SolankiSM07}
296 \citation{DBLP:conf/ih/PevnyFB10}
297 \citation{DBLP:conf/mmsec/FridrichPK07}
298 \citation{bcfg12a:ip}
299 \citation{DBLP:conf/ih/BasFP11}
300 \citation{bcfg12a:ip}
301 \citation{holmes11,ensemble11}
302 \citation{DBLP:conf/ih/BasFP11}
303 \citation{bcfg12a:ip}
304 \@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Implementing the $\mathcal {DI}_3$ scheme}{26}}
305 \@writefile{thm}{\contentsline {Rem}{{Rem}{3}{}}{26}}
306 \@writefile{toc}{\contentsline {subsection}{\numberline {5.5}Evaluation against steganalyzers}{26}}
307 \newlabel{section:steganalysis}{{5.5}{26}}
308 \citation{bcfg12a:ip}
309 \citation{bcfg12b:ip}
310 \citation{DBLP:conf/ih/BasFP11}
311 \@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces $strategy(N,P,\lambda )$}}{27}}
312 \newlabel{algo:strategy}{{1}{27}}
313 \@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces $embed(LSC, M, S, \lambda )$}}{27}}
314 \newlabel{algo:embed}{{2}{27}}
315 \citation{bcfg12b:ip}
316 \citation{bcfg12b:ip}
317 \@writefile{loa}{\contentsline {algocf}{\numberline {3}{\ignorespaces $extract(LSC, S, \lambda ,P)$}}{28}}
318 \newlabel{algo:extract}{{3}{28}}
319 \@writefile{loa}{\contentsline {algocf}{\numberline {4}{\ignorespaces $significationFunction(H)$}}{28}}
320 \newlabel{algo:signification-function}{{4}{28}}
321 \@writefile{toc}{\contentsline {subsection}{\numberline {5.6}Robustness study}{28}}
322 \newlabel{sec:robustness-study}{{5.6}{28}}
323 \citation{Fridrich:2009:SDM:1721894}
324 \citation{DBLP:conf/ih/SolankiSM07}
326 \newlabel{algo:build-function}{{5}{29}}
327 \@writefile{loa}{\contentsline {algocf}{\numberline {5}{\ignorespaces $buildFunction(MSC,PC,LSC)$ )}}{29}}
328 \@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Steganalysis results of HugoBreakers steganalyser applied on steganographic scheme}}{29}}
329 \newlabel{table:holme}{{3}{29}}
330 \@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{29}}
331 \@writefile{toc}{\contentsline {section}{\numberline {7}Appendix}{29}}
332 \newlabel{AppendixIH}{{7}{29}}
333 \@writefile{toc}{\contentsline {subsection}{\numberline {7.1}YASS}{29}}
334 \citation{DBLP:conf/mmsec/FridrichPK07}
335 \citation{DBLP:conf/ih/Westfeld01}
336 \@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Robustness of $\mathcal {DI}_3$ scheme facing several attacks (50 images from the BOSS repository)}}{30}}
337 \newlabel{fig:robustness-results}{{8}{30}}
338 \@writefile{toc}{\contentsline {subsection}{\numberline {7.2}nsF5}{31}}
339 \citation{DBLP:conf/ih/KimDR06}
340 \citation{DBLP:conf/ih/KimDR06}
341 \citation{DBLP:conf/ih/PevnyFB10}
342 \citation{DBLP:journals/tifs/PevnyBF10}
343 \@writefile{toc}{\contentsline {subsection}{\numberline {7.3}MMx}{32}}
344 \@writefile{toc}{\contentsline {subsection}{\numberline {7.4}HUGO}{32}}
347 \bibcite{bcfg12a:ip}{1}
348 \bibcite{bcfg12b:ip}{2}
349 \bibcite{bcfg+13:ip}{3}
350 \bibcite{bcg11b:ip}{4}
351 \bibcite{bfg12:ip}{5}
352 \bibcite{bfg13:ip}{6}
353 \bibcite{bg10b:ip}{7}
354 \bibcite{guyeux10ter}{8}
355 \bibcite{guyeux13:bc}{9}
356 \bibcite{guyeux10}{10}
357 \bibcite{Banks92}{11}
358 \bibcite{DBLP:conf/ih/BasFP11}{12}
359 \bibcite{Cachin2004}{13}
360 \bibcite{Cayre2008}{14}
361 \bibcite{ComesanaPP05bis}{15}
362 \bibcite{Devaney}{16}
363 \bibcite{Formenti1998}{17}
364 \bibcite{Fridrich:2009:SDM:1721894}{18}
365 \bibcite{DBLP:conf/mmsec/FridrichPK07}{19}
366 \bibcite{fgb11:ip}{20}
367 \bibcite{GuyeuxThese10}{21}
368 \bibcite{Guyeux2012}{22}
369 \bibcite{gfb10:ip}{23}
370 \bibcite{Jenkins1996}{24}
371 \bibcite{junod1999cryptographic}{25}
372 \bibcite{Kalker2001}{26}
373 \bibcite{1411349}{27}
374 \bibcite{DBLP:conf/ih/KimDR06}{28}
375 \bibcite{holmes11}{29}
376 \bibcite{ensemble11}{30}
377 \bibcite{Perez-Freire06}{31}
378 \bibcite{DBLP:conf/ih/PevnyFB10}{32}
379 \bibcite{DBLP:journals/tifs/PevnyBF10}{33}
381 \bibcite{rifq/others03}{35}
383 \bibcite{Shujun1}{37}
384 \bibcite{Simmons83}{38}
385 \bibcite{DBLP:conf/ih/SolankiSM07}{39}
386 \bibcite{prng-Blum-goldwasser}{40}
387 \bibcite{DBLP:conf/ih/Westfeld01}{41}
388 \bibcite{Xie09:BASecurity}{42}