1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 title="On locally balanced gray codes",
7 journal="Journal of Applied and Industrial Mathematics",
12 abstract="We consider locally balanced Gray codes.We say that a Gray code is locally balanced if every ``short'' subword in its transition sequence contains all letters of the alphabet |1, 2,..., n{\textasciitilde}. The minimal length of these subwords is the window width of the code. We show that for each n ≥ 3 there exists a Gray code with window width at most n + 3⌊log n⌋.",
17 @article{DBLP:journals/ijbc/Lozi12,
19 title = {Emergence of Randomness from Chaos},
20 journal = {I. J. Bifurcation and Chaos},
24 url = {http://dx.doi.org/10.1142/S0218127412500216},
25 doi = {10.1142/S0218127412500216},
26 timestamp = {Tue, 27 Mar 2012 19:10:15 +0200},
27 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ijbc/Lozi12},
28 bibsource = {dblp computer science bibliography, http://dblp.org}
31 @article{lozi:hal-00813087,
32 TITLE = {{From Chaos to Randomness via Geometric Undersampling}},
33 AUTHOR = {Lozi, Ren{\'e} and Taralova, Ina},
34 URL = {https://hal.archives-ouvertes.fr/hal-00813087},
35 NOTE = {Editors: Witold Jarczyk, Daniele Fournier-Prunaret, João Manuel Goncalves Cabral},
36 JOURNAL = {{ESAIM: Proceedings and Surveys}},
37 PUBLISHER = {{EDP Sciences}},
43 DOI = {10.1051/proc/201446015},
44 KEYWORDS = {chaos ; Pseudo Random Number generator ; geometric undersampling},
45 PDF = {https://hal.archives-ouvertes.fr/hal-00813087/file/Lozi_Taralova_ECIT_2012_HAL.pdf},
46 HAL_ID = {hal-00813087},
50 @inproceedings{espinelrojas:hal-00622989,
51 TITLE = {{NEW ALTERNATE LOZI FUNCTION FOR RANDOM NUMBER GENERATION}},
52 AUTHOR = {Espinel Rojas, Andrea and Taralova, Ina and Lozi, Ren{\'e}},
53 URL = {https://hal.archives-ouvertes.fr/hal-00622989},
54 BOOKTITLE = {{EPNACS 2011 within ECCS'11}},
55 ADDRESS = {Vienne, Austria},
59 KEYWORDS = {Nonlinear dynamical system ; Lozi function ; NIST test ; discrete-time map ; dense chaotic attractor ; pseudo random number generator},
60 PDF = {https://hal.archives-ouvertes.fr/hal-00622989/file/NEW_ALTERNATE_LOZI_FUNCTION_FOR_RANDOM_NUMBER_GENERATION.pdf},
61 HAL_ID = {hal-00622989},
67 @inproceedings{mansingka2013fibonacci,
68 title={Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System},
69 author={Mansingka, Abhinav S and Barakat, Mohamed L and Zidan, M Affan and Radwan, Ahmed G and Salama, Khaled N},
70 booktitle={IT Convergence and Security (ICITCS), 2013 International Conference on},
76 @article{Rossler1976397,
77 title = "An equation for continuous chaos",
78 journal = "Physics Letters A",
85 doi = "http://dx.doi.org/10.1016/0375-9601(76)90101-8",
86 url = "http://www.sciencedirect.com/science/article/pii/0375960176901018",
87 author = "O.E. Rössler",
92 @INPROCEEDINGS{6868789,
93 author={Dabal, Pawel and Pelka, Ryszard},
94 booktitle={Design and Diagnostics of Electronic Circuits Systems, 17th International Symposium on},
95 title={A study on fast pipelined pseudo-random number generator based on chaotic logistic map},
99 keywords={chaotic systems;logistic map;pseudo-random bit generator;system-on-chip},
100 doi={10.1109/DDECS.2014.6868789},}
103 @article{may1976simple,
104 title={Simple mathematical models with very complicated dynamics},
105 author={May, Robert M and others},
113 @article{Silva:2009:LLP:1592409.1592411,
114 author = {Silva, Rui Miguel and Crespo, Rui Gustavo and Nunes, Mario Serafim},
115 title = {LoBa128, a Lorenz\&\#45;Based PRNG for Wireless Sensor Networks},
116 journal = {Int. J. Commun. Netw. Distrib. Syst.},
117 issue_date = {August 2009},
125 url = {http://dx.doi.org/10.1504/IJCNDS.2009.027596},
126 doi = {10.1504/IJCNDS.2009.027596},
128 publisher = {Inderscience Publishers},
129 address = {Inderscience Publishers, Geneva, SWITZERLAND},
130 keywords = {PRNG, WSN, chaos cryptography, key management, pseudo\&\#45;random number generator, statistical attacks, symmetrical encryption, wireless networks, wireless sensor networks},
134 author = {{Lorenz}, E.~N.},
135 title = "{Deterministic Nonperiodic Flow.}",
136 journal = {Journal of Atmospheric Sciences},
141 doi = {10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2},
142 adsurl = {http://adsabs.harvard.edu/abs/1963JAtS...20..130L},
143 adsnote = {Provided by the SAO/NASA Astrophysics Data System}
148 @article{Fang:2014:FAP:2643744.2643848,
149 author = {Fang, Xiaole and Wang, Qianxue and Guyeux, Christophe and Bahi, Jacques M.},
150 title = {FPGA Acceleration of a Pseudorandom Number Generator Based on Chaotic Iterations},
151 journal = {J. Inf. Secur. Appl.},
152 issue_date = {February, 2014},
160 url = {http://dx.doi.org/10.1016/j.jisa.2014.02.003},
161 doi = {10.1016/j.jisa.2014.02.003},
163 publisher = {Elsevier Science Inc.},
164 address = {New York, NY, USA},
165 keywords = {Cryptographical security, Discrete chaotic iterations, FPGA, Internet security, Pseudorandom number generator},
170 @inproceedings{mao2006design,
171 title={Design and FPGA implementation of a pseudo-random bit sequence generator using spatiotemporal chaos},
172 author={Mao, Yaobin and Cao, Liu and Liu, Wenbo},
173 booktitle={Communications, Circuits and Systems Proceedings, 2006 International Conference on},
180 @article{merahcoupling13,
181 title={Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System-Study and Real Time FPGA Implementation},
182 author={Merah, Lahcene and ALI-PACHA, Adda and SAID, Naima HADJ},
187 journal={International Journal of Computer Science and Telecommunications}
191 @article{henon1976two,
192 title={A two-dimensional mapping with a strange attractor},
193 author={H{\'e}non, Michel},
194 journal={Communications in Mathematical Physics},
199 publisher={Springer}}
201 @inproceedings{liu2008improved,
202 title={An improved chaos-based stream cipher algorithm and its VLSI implementation},
203 author={Liu, Shubo and Sun, Jing and Xu, Zhengquan and Cai, Zhaohui},
204 booktitle={Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on},
211 @inproceedings{dabal2012fpga,
212 title={FPGA implementation of chaotic pseudo-random bit generators},
213 author={Dabal, Pawel and Pelka, Ryszard},
214 booktitle={Mixed Design of Integrated Circuits and Systems (MIXDES), 2012 Proceedings of the 19th International Conference},
219 @inproceedings{dabal2011chaos,
220 title={A chaos-based pseudo-random bit generator implemented in FPGA device},
221 author={Dabal, Pawel and Pelka, Ryszard},
222 booktitle={Design and Diagnostics of Electronic Circuits \& Systems (DDECS), 2011 IEEE 14th International Symposium on},
228 @book{wiggins2003introduction,
229 title={Introduction to applied nonlinear dynamical systems and chaos},
230 author={Wiggins, Stephen},
233 publisher={Springer Science \& Business Media}
236 @inproceedings{aagc+15:ip,
237 author = {Bassam AlKindy and
238 Bashar Al{-}Nuaimi and
239 Christophe Guyeux and
240 Jean{-}Fran{\c{c}}ois Couchot and
244 title = {Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm
245 for Inferring Well Supported Phylogenetic Trees},
246 booktitle = {Computational Intelligence Methods for Bioinformatics and Biostatistics
247 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
248 10-12, 2015, Revised Selected Papers},
251 crossref = {DBLP:conf/cibb/2015},
252 url = {http://dx.doi.org/10.1007/978-3-319-44332-4_13},
253 doi = {10.1007/978-3-319-44332-4_13},
254 timestamp = {Tue, 02 Aug 2016 16:01:45 +0200},
255 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/AlKindyAGCSAP15},
256 bibsource = {dblp computer science bibliography, http://dblp.org}
259 @proceedings{DBLP:conf/cibb/2015,
260 editor = {Claudia Angelini and
261 Paola M. V. Rancoita and
263 title = {Computational Intelligence Methods for Bioinformatics and Biostatistics
264 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
265 10-12, 2015, Revised Selected Papers},
266 series = {Lecture Notes in Computer Science},
268 publisher = {Springer},
270 url = {http://dx.doi.org/10.1007/978-3-319-44332-4},
271 doi = {10.1007/978-3-319-44332-4},
272 isbn = {978-3-319-44331-7},
273 timestamp = {Tue, 02 Aug 2016 16:01:14 +0200},
274 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/2015},
275 bibsource = {dblp computer science bibliography, http://dblp.org}
281 @inproceedings{DBLP:conf/apsipa/TanL14,
282 author = {Shunquan Tan and
284 title = {Stacked convolutional auto-encoders for steganalysis of digital images},
285 booktitle = {Asia-Pacific Signal and Information Processing Association Annual
286 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
290 crossref = {DBLP:conf/apsipa/2014},
291 url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
292 doi = {10.1109/APSIPA.2014.7041565},
293 timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
294 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
295 bibsource = {dblp computer science bibliography, http://dblp.org}
297 @proceedings{DBLP:conf/apsipa/2014,
298 title = {Asia-Pacific Signal and Information Processing Association Annual
299 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
301 publisher = {{IEEE}},
303 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
304 isbn = {978-6-1636-1823-8},
305 timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
306 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
307 bibsource = {dblp computer science bibliography, http://dblp.org}
310 @inproceeding{doi:10.1117/12.2083479,
311 author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
313 Deep learning for steganalysis via convolutional neural networks
315 journal = {Proc. SPIE},
318 pages = {94090J-94090J-10},
320 Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
323 doi = {10.1117/12.2083479},
324 URL = { http://dx.doi.org/10.1117/12.2083479},
330 @inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
331 author = {Dan Claudiu Ciresan and
334 Luca Maria Gambardella and
335 J{\"{u}}rgen Schmidhuber},
336 title = {Flexible, High Performance Convolutional Neural Networks for Image
338 booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
339 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
341 pages = {1237--1242},
343 crossref = {DBLP:conf/ijcai/2011},
344 url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
345 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
346 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
347 bibsource = {dblp computer science bibliography, http://dblp.org}
350 @proceedings{DBLP:conf/ijcai/2011,
351 editor = {Toby Walsh},
352 title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
353 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
355 publisher = {{IJCAI/AAAI}},
357 isbn = {978-1-57735-516-8},
358 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
359 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
360 bibsource = {dblp computer science bibliography, http://dblp.org}
364 @article{DBLP:journals/ftsig/DengY14,
365 author = {Li Deng and
367 title = {Deep Learning: Methods and Applications},
368 journal = {Foundations and Trends in Signal Processing},
373 url = {http://dx.doi.org/10.1561/2000000039},
374 doi = {10.1561/2000000039},
375 timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
376 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
377 bibsource = {dblp computer science bibliography, http://dblp.org}
381 author="Bitar, Ahmad W.
383 and Couchot, Jean-Fran{\c{c}}ois
384 and Couturier, Rapha{\"e}l",
385 title="Blind digital watermarking in PDF documents using Spread Transform Dither Modulation",
388 abstract="In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.",
390 doi="10.1007/s11042-015-3034-2",
391 url="http://dx.doi.org/10.1007/s11042-015-3034-2",
392 journal={Multimedia Tools and Applications},
393 publisher={Springer US},
399 author = {Chen, Brian and Wornell, Gregory W.},
400 title = {Provably robust digital watermarking},
401 journal = {Proc. SPIE},
406 doi = {10.1117/12.371232},
407 URL = { http://dx.doi.org/10.1117/12.371232},
412 author={Darazi, R. and Hu, R. and Macq, B.},
413 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
414 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
417 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
418 doi={10.1109/ICASSP.2010.5495455},
422 @INPROCEEDINGS{WLSYNW13,
423 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
424 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
425 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
428 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
429 doi={10.1109/ICIP.2013.6738931},
436 journal={Journal of VLSI signal processing systems for signal, image and video technology},
439 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
440 publisher={Kluwer Academic Publishers},
441 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
442 author={Chen, Brian and Wornell, Gregory W.},
447 author = {Wang, C. T. and Tsai, W. H. },
448 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
451 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
460 OPTorganization = {},
466 @article{DBLP:journals/sigpro/LeeT10,
467 author = {I{-}Shi Lee and
469 title = {A new approach to covert communication via {PDF} files},
470 journal = {Signal Processing},
475 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
476 doi = {10.1016/j.sigpro.2009.07.022},
477 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
478 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
479 bibsource = {dblp computer science bibliography, http://dblp.org}
484 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
485 title = {A Copyright Protection Scheme Based on PDF},
486 journal = {International Journal of Innovative Computing, Information and Control},
493 note = {ISSN 1349-4198},
498 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
499 title = {Using Steganography to hide messages inside PDF files},
500 howpublished = {SSN Project Report},
506 @InProceedings{PD2008,
507 author = {POR, L. Y. and Delina, B.},
508 title = {Information Hiding: A New Approach in Text Steganography},
509 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
518 OPTorganization = {},
524 @article{DBLP:journals/tifs/PevnyBF10,
525 author = {Tom{\'{a}}s Pevn{\'{y}} and
527 Jessica J. Fridrich},
528 title = {Steganalysis by subtractive pixel adjacency matrix},
529 journal = {{IEEE} Transactions on Information Forensics and Security},
534 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
535 doi = {10.1109/TIFS.2010.2045842},
536 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
537 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
538 bibsource = {dblp computer science bibliography, http://dblp.org}
542 @INPROCEEDINGS{rifq/others03,
543 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
546 x-international-audience = {yes},
547 title = {{D}iscrimination power of measures of resemblance},
548 booktitle = {{IFSA}'03},
550 location = {Istanbul, Turkey}
554 @ARTICLE{Rifqi:2000:DPM:342947.342970,
555 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
558 x-international-audience = {yes},
559 title = {{D}iscrimination power of measures of comparison},
560 journal = {{F}uzzy {S}ets and {S}ystems},
568 @book{Anderberg-Cluster-1973,
569 added-at = {2008-10-29T00:31:48.000+0100},
570 author = {Anderberg, M. R.},
571 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
572 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
573 intrahash = {f586cc49441c591f06539d11d3e06006},
574 keywords = {cluster_analysis wismasys0809},
575 publisher = {Academic Press},
576 timestamp = {2008-10-29T00:31:48.000+0100},
577 title = {Cluster Analysis for Applications},
583 @article{yule1950introduction,
584 Author = {Yule, G.U. and Kendall, MG},
585 Date-Added = {2009-08-14 22:16:50 -0500},
586 Date-Modified = {2009-08-14 22:16:50 -0500},
587 Journal = {Statistics},
588 Title = {An Introduction to the Theory of},
592 @inproceedings{fgb11:ip,
594 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
597 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
598 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
599 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
601 address = {Sevilla, Spain},
602 editor = {Javier Lopez and Pierangela Samarati},
603 publisher = {SciTePress},
611 author = {Cayre, F. and Bas, P.},
612 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
613 journal = {IEEE Transactions on Information Forensics and Security},
618 doi = {10.1109/TIFS.2007.916006},
620 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
621 security, watermarking, Kerckhoffs-based embedding security classes,
622 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
623 steganography security, watermark-only-attack, watermarking, Security,
624 spread-spectrum (SS) watermarking},
626 timestamp = {2009.06.29}
628 @INPROCEEDINGS{Perez06,
629 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
630 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
632 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
644 author = {Cayre, F. and Fontaine, C. and Furon, T.},
645 title = {Watermarking security: theory and practice},
646 journal = {IEEE Transactions on Signal Processing},
649 pages = {3976--3987},
651 keywords = {blind source separation, cryptography, watermarking, Fisher information
652 matrix, blind source separation, cryptanalysis, information theory,
653 spread spectrum techniques, substitutive scheme, watermarking security,
654 Blind source separation, Fisher information matrix, equivocation,
655 security, watermarking}
660 @inproceedings{Shujun1,
661 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
662 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
663 Their Roles in Cryptography and Pseudo-Random Coding},
664 booktitle = {Cryptography and Coding, 8th IMA International Conference,
668 publisher = springer,
669 address = springer_loc,
677 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
680 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
681 title = {Random Walk in a N-cube Without Hamiltonian Cycle
682 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
684 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
692 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
695 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
696 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
697 howpublished = {in submission to the ACM Computing Surveys journal},
707 @inproceedings{couchot04:onp,
709 author = {Couchot, Jean-Fran\c{c}ois},
710 title = {V\'erification d'invariant par superposition},
711 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
712 address = {Calais, France},
713 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
714 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
715 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
716 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
725 @inproceedings{aangc+15:ip,
727 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
730 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
731 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
732 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
734 doi = {10.1007/978-3-319-16483-0_38},
735 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
738 address = {Granada, Spain},
749 @inproceedings{agcs+15:ip,
750 author = {Bassam AlKindy and
751 Christophe Guyeux and
752 Jean{-}Fran{\c{c}}ois Couchot and
754 Christian Parisod and
756 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well
757 Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core
759 booktitle = {Algorithms for Computational Biology - Second International Conference,
760 AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
763 crossref = {DBLP:conf/alcob/2015},
764 url = {http://dx.doi.org/10.1007/978-3-319-21233-3_7},
765 doi = {10.1007/978-3-319-21233-3_7},
766 timestamp = {Tue, 28 Jul 2015 14:46:16 +0200},
767 biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/AlKindyGCSPB15},
768 bibsource = {dblp computer science bibliography, http://dblp.org}
771 @proceedings{DBLP:conf/alcob/2015,
772 editor = {Adrian Horia Dediu and
773 Francisco Hern{\'{a}}ndez Quiroz and
774 Carlos Mart{\'{\i}}n{-}Vide and
775 David A. Rosenblueth},
776 title = {Algorithms for Computational Biology - Second International Conference,
777 AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
778 series = {Lecture Notes in Computer Science},
780 publisher = {Springer},
782 url = {http://dx.doi.org/10.1007/978-3-319-21233-3},
783 doi = {10.1007/978-3-319-21233-3},
784 isbn = {978-3-319-21232-6},
785 timestamp = {Tue, 28 Jul 2015 14:45:41 +0200},
786 biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/2015},
787 bibsource = {dblp computer science bibliography, http://dblp.org}
794 @inproceedings{bcg11:ip,
796 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
799 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
800 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
801 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
803 address = {Luxembourg, Luxembourg},
806 note = {Best paper award},
812 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
814 classement = {ACLNI},
817 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
818 title = {Quality analysis of a chaotic proven keyed hash function},
819 journal = {International Journal On Advances in Internet Technology},
830 author = {Jean{-}Fran{\c{c}}ois Couchot and
831 Rapha{\"{e}}l Couturier and
833 title = {{STABYLO:} steganography with adaptive, Bbs, and binary embedding
835 journal = {Annales des T{\'{e}}l{\'{e}}communications},
840 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
841 doi = {10.1007/s12243-015-0466-7},
842 timestamp = {Mon, 28 Sep 2015 12:42:01 +0200},
843 biburl = {http://dblp.uni-trier.de/rec/bib/journals/adt/CouchotCG15},
844 bibsource = {dblp computer science bibliography, http://dblp.org}
847 @inproceedings{fccg15:ip,
849 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
852 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
853 title = {Steganalyzer performances in operational contexts},
854 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
856 address = {Adelaide, Australia},
862 @inproceedings{accfg15:ip,
864 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
867 author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux},
868 title = {Performance Study of Steganalysis Techniques},
869 booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on},
878 @inproceedings{bcfg12a:ip,
880 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
883 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
884 title = {Application of Steganography for Anonymity through the Internet},
885 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
887 url = {http://arxiv.org/abs/1202.5302v1},
888 address = {Venice, Italy},
898 @inproceedings{bcfg+13:ip,
900 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
903 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
904 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
905 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
907 doi = {10.1109/IIH-MSP.2013.141},
908 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
909 address = {Beijing, China},
915 @inproceedings{bcfg12b:ip,
917 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
920 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
921 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
922 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
924 address = {Venice, Italy},
934 @inproceedings{bcg11b:ip,
936 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
939 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
940 title = {Steganography: a Class of Algorithms having Secure Properties},
941 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
943 address = {Dalian, China},
952 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
955 impact-factor ={1.363},
956 isi-acro = {COMPUT J},
957 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
958 title = {Steganography: a class of secure and robust algorithms},
959 journal = {The Computer Journal},
963 doi = {10.1093/comjnl/bxr116},
964 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
965 publisher = {Oxford University Press},
971 @inproceedings{bcgw11:ip,
973 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
976 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
977 title = {Class of Trustworthy Pseudo Random Number Generators},
978 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
980 address = {Luxembourg, Luxembourg},
988 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
991 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
992 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
993 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
1003 @inproceedings{aagp+15:ip,
1005 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1007 classement = {ACTIN},
1008 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
1009 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
1010 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
1012 address = {Naples, Italy},
1020 @inproceedings{acgm+14:ij,
1022 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1024 classement = {ACTI},
1025 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
1026 title = {Finding the Core-Genes of Chloroplasts},
1027 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
1029 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
1031 doi = {10.7763/IJBBB.2014.V4.371},
1032 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
1033 address = {Copenhagen, Denmark},
1043 @inproceedings{akgcs+14:oip,
1045 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1048 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
1049 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
1050 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
1051 address = {Belfast, United Kingdom},
1055 note = {Short paper},
1060 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1063 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1064 title = {Finding the core-genes of Chloroplast Species},
1065 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
1075 @PhdThesis{guyeuxphd,
1076 author = {Guyeux, Christophe},
1077 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
1078 type = {Th\`ese de {D}octorat},
1079 school = {LIFC, Universit\'e de Franche-Comt\'e},
1081 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
1082 month = {13 décembre},
1087 @inproceedings{chgw+14:oip,
1089 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
1091 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
1092 title = {Pseudorandom Number Generators with Balanced Gray Codes},
1093 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
1095 address = {Vienna, Austria},
1101 @inproceedings{ccfg16:ip,
1102 author = {Couchot, Jean-Fran\c{c}ois and
1103 Couturier, Rapha\"el and Fadil, Yousra Ahmed and Guyeux, Christophe},
1104 title = {A Second Order Derivatives based Approach for Steganography},
1105 booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
1116 @INPROCEEDINGS{nusmv02,
1117 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
1118 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
1119 Sebastiani and Armando Tacchella},
1120 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
1124 crossref = {DBLP:conf/cav/2002}
1128 author = {Nishanth Chandrasekaran},
1129 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
1133 @InProceedings{GO01,
1134 Author = "Gastin, P. and Oddoux, D.",
1135 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
1136 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
1137 Publisher = "Springer",
1144 @inproceedings{cg04:np,
1146 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
1147 title = {Analyse d'atteignabilit\'e d\'eductive},
1148 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
1150 editor = {Julliand, Jacques},
1151 address = {Besan\c{c}on, France},
1160 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1161 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
1162 journal = {Journal of the Brazilian Computer Society (JBCS)},
1166 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
1169 note = {ISSN 0104-6500},
1174 @inproceedings{cddg+04:ip,
1176 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1177 equipe = {vesontio},
1178 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1179 title = {Proving and Debugging Set-Based Specifications},
1180 booktitle = {WMF'03 proceedings},
1181 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
1184 editor = {A. Cavalcanti and P. Machado},
1185 address = {Campina Grande, Brazil},
1186 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
1193 @inproceedings{cdgr04:onp,
1195 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1196 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
1198 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
1199 address = {Besan\c{c}on, France},
1202 editor = {Julliand, Jacques},
1203 note = {Session outils},
1208 @INPROCEEDINGS{CGK05,
1209 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
1210 title = {A uniform deductive approach for parameterized protocol safety},
1214 bibsource = {DBLP, http://dblp.uni-trier.de},
1215 crossref = {DBLP:conf/kbse/2005},
1216 ee = {http://doi.acm.org/10.1145/1101908.1101971}
1219 @INPROCEEDINGS{abcvs05,
1220 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
1221 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
1223 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
1227 address = {Guelph, Canada},
1229 note = {ISSN 1492-8760}
1233 author = {Bahi, J. M.},
1234 title = {Boolean totally asynchronous iterations},
1242 author = {Bahi, J. M. and Contassot-Vivier, S.},
1243 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1253 author = {Bahi, J. M. and Contassot-Vivier, S.},
1254 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
1259 pages = {1353--1363},
1264 @inproceedings{bcgr11:ip,
1266 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1268 classement = {ACTI},
1269 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
1270 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
1271 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
1275 doi = {10.1007/978-3-642-22953-4_11},
1276 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
1277 address = {Oslo, Norway},
1285 @techreport{BCVC10:ir,
1286 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
1287 title = {Convergence Results of Combining Synchronism and Asynchronism for
1288 Discrete-State Discrete-Time Dynamic Network},
1290 institution = {LIFC - Laboratoire d’{I}nformatique de
1291 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1292 type = {Research Report},
1293 number = {RR2010-02},
1294 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
1298 @techreport{Cou10:ir,
1299 author = {Couchot, J.-F.},
1300 title = {Formal {C}onvergence {P}roof for {D}iscrete
1301 {D}ynamical {S}ystems},
1302 institution = {LIFC - Laboratoire d’{I}nformatique de
1303 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1304 type = {Research Report},
1305 number = {RR2010-03},
1306 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
1314 author = {Bahi, J. M. and Michel, C.},
1315 title = {Convergence of discrete asynchronous iterations},
1316 journal = {International Journal Computer Mathematics},
1323 author = {Bahi, J. M. and Michel, C.},
1324 title = {Simulations of asynchronous evolution of discrete systems},
1325 journal = {Simulation Practice and Theory},
1333 author = {G\'{e}rard M. Baudet},
1334 title = {Asynchronous Iterative Methods for Multiprocessors},
1340 doi = {http://doi.acm.org/10.1145/322063.322067},
1346 title = {Parallel and distributed computation: numerical methods},
1347 publisher = prenticeHall,
1349 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1350 isbn = {0-13-648700-9}
1354 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
1355 title = {The software model checker Blast},
1363 @INPROCEEDINGS{LeCun85,
1364 author = {Y Le~Cun},
1365 title = {A learning scheme for threshold networks},
1366 booktitle = {Cognitiva'95},
1369 address = {Paris, France}
1373 author = {Jeffrey L. Elman},
1374 title = {Finding Structure in Time},
1375 journal = {Cognitive Science},
1382 author = {Andreas Frommer and Daniel B. Szyld},
1383 title = {On asynchronous iterations},
1389 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
1391 publisher = elsevier
1395 author = {Goles Ch., E. and Salinas,L.},
1396 title = {Comparison between parallel and serial dynamics of Boolean networks},
1405 title = {The SPIN Model Checker: Primer and Reference Manual},
1406 publisher = {Addison-Wesley, Pearson Education},
1408 author = {Gerard J. Holzmann}
1412 author = {Shih M.-H. and Ho, J.-L.},
1413 title = {Solution of the Boolean Markus-Yamabe Problem},
1414 journal = advapplMath,
1422 author = {Adrien Richard},
1423 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1425 journal = advapplMath,
1430 publisher = elsevier
1434 author = {Adrien Richard and Jean-Paul Comet},
1435 title = {Necessary conditions for multistationarity in discrete dynamical
1437 journal = discreteapplMath,
1440 pages = {2403--2413},
1443 publisher = elsevier
1447 title = {Les syst\`emes dynamiques discrets},
1448 publisher = springer,
1450 author = {F. Robert},
1452 series = {Math\'ematiques et Applications}
1456 author = {Shih, M.-H. and Dong J.-L.},
1457 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1458 journal = advapplMath,
1467 author = {Thomas, R.},
1468 title = {Boolean Formalization of Genetic Control Circuits},
1476 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1477 title = {Absence of Cycles in Symmetric Neural Networks},
1481 pages = {1235-1249},
1483 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1486 @PROCEEDINGS{DBLP:conf/cav/2002,
1487 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1488 Denmark, July 27-31, 2002, Proceedings},
1490 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1493 publisher = springer,
1497 @PROCEEDINGS{DBLP:conf/kbse/2005,
1498 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1499 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1501 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1503 bibsource = {DBLP, http://dblp.uni-trier.de},
1508 author = {Ben-Ari, Mordechai},
1510 title = {Principles of the Spin Model Checker},
1511 isbn = {1846287693, 9781846287695}},
1512 publisher = springer,
1516 @INPROCEEDINGS{Wei97,
1517 author = {Weise,Carsten},
1518 title = {An incremental formal semantics for {PROMELA}},
1519 booktitle = {SPIN97, the Third SPIN Workshop},
1524 @PHDTHESIS{Couchot-PhD06,
1525 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1526 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1529 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1530 TYPE = {Th\`ese de {D}octorat},
1535 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1536 Page, M. and Tewfik, S. and Geiselmann, J.},
1537 title = {Qualitative simulation of genetic regulatory networks
1538 using piecewise-linear models},
1539 journal = {Bull. Math. Biol.},
1551 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1552 title = {A Fruitful Application of Formal Methods to Biological
1553 Regulatory Networks: Extending {T}homas' Asynchronous
1554 Logical Approach with Temporal Logic},
1555 journal = {J. Theor. Biol.},
1565 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1566 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1567 journal = {Biosystems},
1579 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1581 title = {Genetic Network Analyzer: qualitative simulation
1582 of genetic regulatory networks.},
1583 journal = {Bioinformatics},
1591 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1592 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1593 journal = {Genes, Genomes and Genomics},
1605 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1606 title = {Analysing formal models of genetic regulatory networks with delays},
1607 journal = {Int. J. Bioinformatics Res. Appl.},
1613 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1614 publisher = {Inderscience Publishers},
1615 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1618 author = {Richard, A.},
1619 title = {Local negative circuits and fixed points in Boolean networks},
1620 institution = {preprint arXiv number 0910.0750},
1633 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1634 title = {Graphic requirement for multistability and attractive cycles in a
1635 Boolean dynamical framework},
1636 journal = {Advances in Applied Mathematics},
1642 timestamp = {2009.02.05}
1645 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1646 author = {Jacques M. Bahi and
1647 Sylvain Contassot-Vivier and
1651 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1652 in Heterogeneous Environments},
1653 booktitle = {ICANN (2)},
1656 ee = {http://dx.doi.org/10.1007/11840930_81},
1657 crossref = {DBLP:conf/icann/2006-2},
1658 bibsource = {DBLP, http://dblp.uni-trier.de}
1661 @proceedings{DBLP:conf/icann/2006-2,
1662 editor = {Stefanos D. Kollias and
1663 Andreas Stafylopatis and
1666 title = {Artificial Neural Networks - ICANN 2006, 16th International
1667 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1669 booktitle = {ICANN (2)},
1670 publisher = {Springer},
1671 series = {Lecture Notes in Computer Science},
1674 isbn = {3-540-38871-0},
1675 bibsource = {DBLP, http://dblp.uni-trier.de}
1682 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1684 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1685 publisher = {Eyrolles},
1703 title = {An Introduction to Chaotic Dynamical Systems},
1704 publisher = {Redwood City: Addison-Wesley},
1706 author = {R. L. Devaney},
1709 timestamp = {27/01/2008}
1715 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1717 classement = {ACLI},
1718 impact-factor ={1.255},
1719 isi-acro = {MECHATRONICS},
1720 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1721 title = {Active {MEMS}-based flow control using artificial neural network},
1722 journal = {Mechatronics},
1726 doi = {10.1016/j.mechatronics.2013.02.010},
1727 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1728 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1729 publisher = {Elsevier},
1732 note = {Available online.}
1737 @inproceedings{cds12:ip,
1739 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1741 classement = {ACTI},
1742 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1743 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1744 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1746 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1747 address = {Besan\c{c}on, France},
1748 publisher = {IEEE CPS},
1757 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1759 classement = {ACLI},
1760 impact-factor ={2.081},
1762 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1763 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1764 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1767 pages = {013122-1 -- 013122-9},
1768 doi = {10.1063/1.3685524},
1769 url = {http://dx.doi.org/10.1063/1.3685524},
1770 publisher = {American Institute of Physics},
1778 @inproceedings{bgs11:ip,
1780 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1782 classement = {ACTI},
1783 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1784 title = {Building a Chaotic Proven Neural Network},
1785 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1786 address = {Maldives, Maldives},
1792 author = {Bahi, Jacques M. and Guyeux, Christophe},
1793 title = {Hash Functions Using Chaotic Iterations},
1794 journal = {Journal of Algorithms \& Computational Technology},
1799 classement = {ACLNI},
1800 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1802 impact-factor = {#},
1809 @PHDTHESIS{GuyeuxThese10,
1810 author = {Christophe Guyeux},
1811 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1812 en s\'{e}curit\'{e} informatique},
1813 school = {Universit\'{e} de Franche-Comt\'{e}},
1815 owner = {christophe},
1816 timestamp = {2010.12.21}
1819 @INPROCEEDINGS{gfb10:ip,
1820 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1821 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1822 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1823 Multimedia Signal Processing},
1826 address = {Darmstadt, Germany},
1828 classement = {ACTI},
1829 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1836 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1837 title = {Topological entropy},
1838 journal = {Transactions of the American Mathematical Society},
1843 timestamp = {2008.05.29}
1847 author = {Rufus Bowen},
1848 title = {Entropy for group endomorphisms and homogeneous spaces},
1849 journal = {Transactions of the American Mathematical Society},
1854 timestamp = {15/02/2008}
1857 @article{10.1109/CIMSiM.2010.36,
1858 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1859 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1860 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1864 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1865 publisher = {IEEE Computer Society},
1866 address = {Los Alamitos, CA, USA},
1868 @article{10.1109/ICME.2003.1221665,
1869 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1870 title = {Neural network based steganalysis in still images},
1871 journal ={Multimedia and Expo, IEEE International Conference on},
1875 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1876 publisher = {IEEE Computer Society},
1877 address = {Los Alamitos, CA, USA},
1880 @ARTICLE{Sullivan06steganalysisfor,
1881 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1882 title = {Steganalysis for Markov cover data with applications to images},
1883 journal = {IEEE Transactions on Information Forensics and Security},
1892 author = "Gray, Frank",
1893 title = "Pulse code communication",
1894 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1899 @INPROCEEDINGS{guyeux10ter,
1900 author = {Bahi, Jacques M. and Guyeux, Christophe},
1901 title = {A new chaos-based watermarking algorithm},
1902 booktitle = {SECRYPT'10, International Conference on Security
1906 address = {Athens, Greece},
1908 publisher = {SciTePress},
1909 classement = {ACTI},
1910 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1916 @inproceedings{Qiao:2009:SM:1704555.1704664,
1917 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1918 title = {Steganalysis of MP3Stego},
1919 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1920 series = {IJCNN'09},
1922 location = {Atlanta, Georgia, USA},
1923 pages = {2723--2728},
1925 publisher = {IEEE Press}
1928 @inproceedings{CouchotD07IFM,
1930 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1933 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1934 title = {Guiding the Correction of Parameterized Specifications},
1935 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1939 publisher = {Springer},
1940 doi = {10.1007/978-3-540-73210-5_10},
1941 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1942 address = {Oxford, UK},
1948 @inproceedings{couchot07FTP,
1952 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1953 title = {A Graph-based Strategy for the Selection of Hypotheses},
1954 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1955 address = {Liverpool, UK},
1962 @inproceedings{cgs09:ip,
1964 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1966 classement = {ACTI},
1967 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1968 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1969 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1970 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1971 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1972 publisher = {ACM Press},
1974 url = {http://arxiv.org/abs/0907.1357},
1975 otherUrl = {http://hal.inria.fr/inria-00402204},
1976 address = {Grenoble, France},
1977 editor = {Hassen Sa\"{i}di and N. Shankar},
1984 @inproceedings{couchot07cade,
1988 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1989 title = {Handling Polymorphism in Automated Deduction},
1990 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1994 publisher = {Springer},
1995 isbn = {978-3-540-73594-6},
1996 doi = {10.1007/978-3-540-73595-3_18},
1997 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1998 address = {Bremen, Germany},
2010 @inproceedings{BCDG07,
2012 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
2013 equipe = {vesontio},
2014 classement = {ACTI},
2015 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
2016 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
2017 booktitle = {B'2007, the 7th Int. B Conference},
2021 publisher = {Springer},
2022 doi = {10.1007/11955757_10},
2023 url = {http://dx.doi.org/10.1007/11955757_10},
2024 editor = {Julliand, Jacques and Kouchnarenko, Olga},
2025 address = {Besancon, France},
2033 @article{byrd1995limited,
2034 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
2035 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
2036 journal = {SIAM J. Sci. Comput.},
2037 issue_date = {Sept. 1995},
2043 pages = {1190--1208},
2045 url = {http://dx.doi.org/10.1137/0916069},
2046 doi = {10.1137/0916069},
2048 publisher = {Society for Industrial and Applied Mathematics},
2049 address = {Philadelphia, PA, USA},
2050 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
2053 @article{ANU:1770520,
2054 author = {Powell,M. J. D.},
2055 title = {Direct search algorithms for optimization calculations},
2056 journal = {Acta Numerica},
2063 doi = {10.1017/S0962492900002841},
2064 URL = {http://journals.cambridge.org/article_S0962492900002841},
2070 journal={The Journal of Supercomputing},
2073 doi={10.1007/s11227-010-0500-5},
2074 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
2075 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
2076 publisher={Springer US},
2077 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
2078 author={Wang, Honggang},
2084 author={Yifeng He and Lee, I. and Ling Guan},
2085 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
2086 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
2091 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
2092 doi={10.1109/TCSVT.2009.2017411},
2096 author={Palomar, D.P. and Mung Chiang},
2097 journal={Selected Areas in Communications, IEEE Journal on},
2098 title={A tutorial on decomposition methods for network utility maximization},
2103 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
2104 doi={10.1109/JSAC.2006.879350},
2109 journal={EURASIP Journal on Information Security},
2113 doi={10.1186/1687-417X-2014-1},
2114 title={Universal distortion function for steganography in an arbitrary domain},
2115 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
2116 publisher={Springer International Publishing},
2117 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
2125 @inproceedings{conf/wifs/HolubF12,
2126 added-at = {2013-01-23T00:00:00.000+0100},
2127 author = {Holub, Vojtech and Fridrich, Jessica J.},
2128 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
2130 crossref = {conf/wifs/2012},
2131 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
2132 interhash = {cbef658a6868216eef585dd759ae0668},
2133 intrahash = {a685b4b8b521ac99734fb52c064ca994},
2134 isbn = {978-1-4673-2285-0},
2138 timestamp = {2013-01-23T00:00:00.000+0100},
2139 title = {Designing steganographic distortion using directional filters.},
2140 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
2144 @proceedings{conf/wifs/2012,
2145 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
2146 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
2147 publisher = {{IEEE}},
2149 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
2150 isbn = {978-1-4673-2285-0},
2151 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
2152 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
2153 bibsource = {dblp computer science bibliography, http://dblp.org}
2157 @article{FillerJF11,
2158 author = {Tom{\'a}s Filler and
2160 Jessica J. Fridrich},
2161 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
2163 journal = {IEEE Transactions on Information Forensics and Security},
2168 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2169 bibsource = {DBLP, http://dblp.uni-trier.de}
2172 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2173 editor = {Ira S. Moskowitz},
2174 author = {Shelby Pereira and
2175 Sviatoslav Voloshynovskiy and
2177 St{\'e}phane Marchand-Maillet and
2179 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
2180 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
2181 title = {Second Generation Benchmarking and Application Oriented
2186 publisher = springer,
2187 address = springer_loc,
2193 @inproceedings{DBLP:conf/ih/Westfeld01,
2194 added-at = {2011-06-28T00:00:00.000+0200},
2195 author = {Westfeld, Andreas},
2196 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
2197 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
2198 editor = {Ira S. Moskowitz},
2200 publisher = springer,
2201 address = springer_loc,
2204 title = {F5-A Steganographic Algorithm.},
2213 @article{Chang20101286,
2214 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
2215 journal = "Digital Signal Processing",
2218 pages = "1286 - 1307",
2222 doi = "10.1016/j.dsp.2009.11.005",
2223 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
2224 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
2225 keywords = "Security",
2226 keywords = "Wet paper coding",
2227 keywords = "Steganography",
2228 keywords = "Indicator",
2229 keywords = "Fuzzy edge detector"
2234 @article{Hu:2007:HPE:1282866.1282944,
2235 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
2236 title = {A high performance edge detector based on fuzzy inference rules},
2237 journal = {Inf. Sci.},
2238 issue_date = {November, 2007},
2244 pages = {4768--4784},
2246 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
2247 doi = {10.1016/j.ins.2007.04.001},
2249 publisher = {Elsevier Science Inc.},
2250 address = {New York, NY, USA},
2251 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
2255 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
2256 author = {Sorina Dumitrescu and
2258 editor = {Ahmet M. Eskicioglu and
2259 Jessica J. Fridrich and
2261 title = {LSB steganalysis based on high-order statistics},
2262 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
2263 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
2266 address = {New York, NY, USA},
2269 ee = {http://doi.acm.org/10.1145/1073170.1073176},
2270 bibsource = {DBLP, http://dblp.uni-trier.de}
2273 @inproceedings{DBLP:conf/ih/Ker05,
2274 author = {Andrew D. Ker},
2275 title = {A General Framework for Structural Steganalysis of LSB Replacement},
2276 editor = {Mauro Barni and
2277 Jordi Herrera-Joancomart\'{\i} and
2278 Stefan Katzenbeisser and
2279 Fernando P{\'e}rez-Gonz{\'a}lez},
2280 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
2281 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
2284 ee = {http://dx.doi.org/10.1007/11558859_22},
2285 publisher = springer,
2286 address = springer_loc,
2293 @inproceedings{FK12,
2294 editor = {Matthias Kirchner and
2296 booktitle = {Information Hiding - 14th International Conference, IH 2012,
2297 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
2298 author = {Jessica J. Fridrich and
2300 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
2304 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
2306 publisher = springer,
2307 address = springer_loc,
2309 bibsource = {DBLP, http://dblp.uni-trier.de}
2313 @article{DBLP:journals/tsp/DumitrescuWW03,
2314 added-at = {2012-02-06T00:00:00.000+0100},
2315 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
2316 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
2317 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
2318 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
2319 intrahash = {556caad9b61980d3458885153a52321c},
2320 journal = {IEEE Transactions on Signal Processing},
2323 pages = {1995-2007},
2324 timestamp = {2012-02-06T00:00:00.000+0100},
2325 title = {Detection of LSB steganography via sample pair analysis.},
2326 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
2334 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
2335 editor = {Nicolas D. Georganas and
2336 Radu Popescu-Zeletin},
2337 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
2338 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
2340 author = {Jessica J. Fridrich and
2343 title = {Reliable detection of LSB steganography in color and grayscale
2347 ee = {http://doi.acm.org/10.1145/1232454.1232466},
2349 address = {New York, NY, USA},
2351 bibsource = {DBLP, http://dblp.uni-trier.de}
2358 @inproceedings{DBLP:conf/ih/PevnyFB10,
2359 author = {Tom{\'a}s Pevn{\'y} and
2360 Tom{\'a}s Filler and
2362 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
2364 editor = {Rainer B{\"o}hme and
2365 Philip W. L. Fong and
2366 Reihaneh Safavi-Naini},
2367 booktitle = {Information Hiding - 12th International Conference, IH 2010,
2368 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2373 publisher = springer,
2374 address = springer_loc,
2377 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
2378 bibsource = {DBLP, http://dblp.uni-trier.de}
2387 author = {Tom{\'a}s Pevn{\'y} and
2388 Tom{\'a}s Filler and
2391 title = {Break Our Steganographic System},
2392 OPThowpublished = {},
2395 note = {Available at \url{http://www.agents.cz/boss/}},
2399 @proceedings{DBLP:conf/ih/2010,
2400 editor = {Rainer B{\"o}hme and
2401 Philip W. L. Fong and
2402 Reihaneh Safavi-Naini},
2403 title = {Information Hiding - 12th International Conference, IH 2010,
2404 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2406 booktitle = {Information Hiding},
2407 publisher = springer,
2408 address = springer_loc,
2412 isbn = {978-3-642-16434-7},
2413 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
2414 bibsource = {DBLP, http://dblp.uni-trier.de}
2418 @article{DBLP:journals/eswa/ChenCL10,
2419 added-at = {2010-07-21T15:44:10.000+0200},
2420 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2421 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2422 date = {2010-05-03},
2423 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2424 interhash = {bc34a5f04661fee24ee62c39e76361be},
2425 intrahash = {28889a4ab329da28559f0910469f054b},
2426 journal = {Expert Systems with Applications},
2429 pages = {3292-3301},
2430 timestamp = {2010-07-21T15:44:10.000+0200},
2431 title = {High payload steganography mechanism using hybrid edge detector.},
2432 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2437 @article{DBLP:journals/tifs/FillerJF11,
2438 added-at = {2011-09-29T00:00:00.000+0200},
2439 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2440 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2441 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2442 interhash = {b27d23ed0c9936d568e16c51378abccd},
2443 intrahash = {50e43c05a74eec17524b3df8db442da5},
2444 journal = {IEEE Transactions on Information Forensics and Security},
2448 timestamp = {2011-09-29T00:00:00.000+0200},
2449 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2450 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2458 @inproceedings{DBLP:conf/ih/KimDR06,
2459 added-at = {2007-09-20T00:00:00.000+0200},
2460 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2461 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2462 booktitle = {Information Hiding},
2463 crossref = {DBLP:conf/ih/2006},
2464 date = {2007-09-20},
2465 description = {dblp},
2466 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2467 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2468 interhash = {399aab122b39cfd6f6e951a1b276c786},
2469 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2470 isbn = {978-3-540-74123-7},
2474 publisher = springer,
2475 address = springer_loc,
2477 timestamp = {2007-09-20T00:00:00.000+0200},
2478 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2479 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2485 @proceedings{DBLP:conf/ih/2006,
2486 editor = {Jan Camenisch and
2487 Christian S. Collberg and
2490 title = {Information Hiding, 8th International Workshop, IH 2006,
2491 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2492 booktitle = {Information Hiding},
2493 publisher = springer,
2494 address = springer_loc,
2498 isbn = {978-3-540-74123-7},
2499 bibsource = {DBLP, http://dblp.uni-trier.de}
2504 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2505 author = {Jessica J. Fridrich and
2506 Tom{\'a}s Pevn{\'y} and
2508 title = {Statistically undetectable jpeg steganography: dead ends
2509 challenges, and opportunities},
2511 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2512 editor = {Deepa Kundur and
2513 Balakrishnan Prabhakaran and
2515 Jessica J. Fridrich},
2516 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2517 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2519 address = {New York, NY, USA},
2522 isbn = {978-1-59593-857-2},
2523 bibsource = {DBLP, http://dblp.uni-trier.de}
2529 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2530 editor = {Nasir D. Memon and
2532 Adnan M. Alattar and
2534 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2535 Electronic Imaging Symposium, San Jose, CA, USA, January
2536 18-20, 2010, Proceedings},
2537 author = {Tom{\'a}s Filler and
2539 Jessica J. Fridrich},
2540 title = {Minimizing embedding impact in steganography using trellis-coded
2544 ee = {http://dx.doi.org/10.1117/12.838002},
2545 bibsource = {DBLP, http://dblp.uni-trier.de},
2549 series = {SPIE Proceedings},
2560 @proceedings{DBLP:conf/mediaforensics/2010,
2561 editor = {Nasir D. Memon and
2563 Adnan M. Alattar and
2565 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2566 Electronic Imaging Symposium, San Jose, CA, USA, January
2567 18-20, 2010, Proceedings},
2568 booktitle = {Media Forensics and Security},
2571 series = {SPIE Proceedings},
2574 isbn = {978-0-8194-7934-1},
2575 bibsource = {DBLP, http://dblp.uni-trier.de}
2578 @article{DBLP:journals/corr/abs-1112-5239,
2579 author = {Jacques M. Bahi and
2580 Rapha{\"e}l Couturier and
2581 Christophe Guyeux and
2582 Pierre-Cyrille H{\'e}am},
2583 title = {Efficient and Cryptographically Secure Generation of Chaotic
2584 Pseudorandom Numbers on GPU},
2586 volume = {abs/1112.5239},
2588 ee = {http://arxiv.org/abs/1112.5239},
2589 bibsource = {DBLP, http://dblp.uni-trier.de}
2593 author = {Ponomarenko, Nikolay},
2594 title = {PSNR-HVS-M page},
2595 OPThowpublished = {},
2598 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2604 author = {Bovik, Alan C.},
2605 title = {BIQI page},
2606 OPThowpublished = {},
2609 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2614 @InProceedings{PSECAL07,
2615 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2616 title = {On between-coefficient contrast masking of DCT basis functions},
2617 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2620 editor = {Li,Baoxin},
2626 OPTorganization = {},
2634 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2635 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2636 journal = {IEEE Signal Processing Letters},
2647 @inproceedings{DBLP:conf/crypto/ShubBB82,
2648 author = {Lenore Blum and
2651 title = {Comparison of Two Pseudo-Random Number Generators},
2652 editor = {David Chaum and
2653 Ronald L. Rivest and
2655 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2656 Barbara, California, USA, August 23-25, 1982},
2658 bibsource = {DBLP, http://dblp.uni-trier.de},
2659 publisher = {Plenum Press},
2660 address={New York, NY, USA},
2663 bibsource = {DBLP, http://dblp.uni-trier.de}
2667 @inproceedings{Blum:1985:EPP:19478.19501,
2668 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2669 Barbara, California, USA, August 19-22, 1984, Proceedings},
2670 author = {Manuel Blum and
2672 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2673 Which Hides All Partial Information},
2677 editor = {G. R. Blakley and
2679 publisher = springer,
2680 address = springer_loc,
2687 @article{DBLP:journals/ejisec/FontaineG07,
2688 author = {Caroline Fontaine and
2690 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2691 journal = {EURASIP Journal on Information Security},
2696 ee = {http://dx.doi.org/10.1155/2007/13801},
2697 bibsource = {DBLP, http://dblp.uni-trier.de}
2701 @article{Luo:2010:EAI:1824719.1824720,
2702 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2703 title = {Edge adaptive image steganography based on LSB matching revisited},
2704 journal = {IEEE Transactions on Information Forensics and Security},
2712 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2713 doi = {10.1109/TIFS.2010.2041812},
2715 publisher = {IEEE Press},
2716 address = {Piscataway, NJ, USA},
2717 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2720 @article{Mielikainen06,
2721 author = {Mielikainen, J.},
2722 title = {LSB Matching Revisited},
2723 journal = {IEEE Signal Processing Letters},
2738 @article{Liu:2008:FMP:1284917.1285196,
2739 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2740 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2741 journal = {Pattern Recogn.},
2742 issue_date = {January, 2008},
2750 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2751 doi = {10.1016/j.patcog.2007.06.005},
2753 publisher = {Elsevier Science Inc.},
2754 address = {New York, NY, USA},
2755 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2760 @InProceedings{LHS08,
2761 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2762 title = {Textural features based universal steganalysis},
2765 booktitle = {Proc. SPIE 6819},
2776 OPTorganization = {},
2783 @InProceedings{KF11,
2784 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2785 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2788 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2792 pages = {78800L-78800L-13},
2801 OPTorganization = {},
2807 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2808 author = {Jan Kodovský and
2810 Jessica J. Fridrich},
2811 title = {Modern steganalysis can detect YASS.},
2812 booktitle = {Media Forensics and Security},
2815 ee = {http://dx.doi.org/10.1117/12.838768}
2818 @article{DBLP:journals/tifs/KodovskyFH12,
2819 author = {Jan Kodovsk{\'y} and
2820 Jessica J. Fridrich and
2822 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2823 journal = {IEEE Transactions on Information Forensics and Security},
2828 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2829 bibsource = {DBLP, http://dblp.uni-trier.de}
2834 @article{Fillatre:2012:ASL:2333143.2333587,
2835 author = {Fillatre, Lionel},
2836 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2837 journal = {IEEE Transactions on Signal Processing},
2845 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2846 doi = {10.1109/TSP.2011.2174231},
2848 publisher = {IEEE Press},
2849 address = {Piscataway, NJ, USA},
2853 @inproceedings{Tyan1993,
2854 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2855 address = ieecs_loc,
2857 author = {Tyan, C. Y. and Wang, P. P.},
2858 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2859 citeulike-article-id = {7936501},
2860 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2862 posted-at = {2010-10-01 17:27:48},
2865 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2871 @article{Canny:1986:CAE:11274.11275,
2872 author = {Canny, J},
2873 title = {A Computational Approach to Edge Detection},
2874 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2875 issue_date = {June 1986},
2883 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2884 doi = {10.1109/TPAMI.1986.4767851},
2886 publisher = {IEEE Computer Society},
2887 address = {Washington, DC, USA},
2888 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2892 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2893 author = {Jessica J. Fridrich and
2894 Jan Kodovsk{\'y} and
2897 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2899 booktitle = {Information Hiding},
2902 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2903 crossref = {DBLP:conf/ih/2011},
2904 bibsource = {DBLP, http://dblp.uni-trier.de}
2906 @proceedings{DBLP:conf/ih/2011,
2907 editor = {Tom{\'a}s Filler and
2908 Tom{\'a}s Pevn{\'y} and
2911 title = {Information Hiding - 13th International Conference, IH 2011,
2912 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2914 booktitle = {Information Hiding},
2915 publisher = springer,
2916 address = springer_loc,
2920 isbn = {978-3-642-24177-2},
2921 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2922 bibsource = {DBLP, http://dblp.uni-trier.de}
2925 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2926 author = {Jessica J. Fridrich},
2927 title = {Modern Trends in Steganography and Steganalysis},
2931 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2932 crossref = {DBLP:conf/iwdw/2011},
2933 bibsource = {DBLP, http://dblp.uni-trier.de}
2935 @proceedings{DBLP:conf/iwdw/2011,
2936 editor = {Yun-Qing Shi and
2937 Hyoung-Joong Kim and
2938 Fernando P{\'e}rez-Gonz{\'a}lez},
2939 title = {Digital Forensics and Watermarking - 10th International
2940 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2941 2011, Revised Selected Papers},
2943 publisher = springer,
2944 address = springer_loc,
2948 isbn = {978-3-642-32204-4},
2949 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2950 bibsource = {DBLP, http://dblp.uni-trier.de}
2957 @InProceedings{kcm16:ip,
2958 author = {Khernane, N. and Couchot, J.-F. and Mostefaoui, A.},
2959 title = {Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints},
2962 booktitle = {MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access},
2971 OPTorganization = {},
2977 @article{MCErlang07,
2978 author = {Fredlund, Lars-Ake and Svensson, Hans},
2979 title = {McErlang: a model checker for a distributed functional programming language},
2980 journal = {SIGPLAN Not.},
2989 @inproceedings{Bogor03,
2991 Matthew B. Dwyer and
2993 title = {Bogor: an extensible and highly-modular software model checking
2995 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2996 of Software Engineering 2003},
3004 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
3005 title = {On Devaney's Definition of Chaos},
3006 journal = {Amer. Math. Monthly},
3012 timestamp = {27/01/2008}
3015 @article{Crook2007267,
3016 title = "Pattern recall in networks of chaotic neurons",
3017 journal = "Biosystems",
3020 pages = "267 - 274",
3023 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
3024 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
3026 keywords = "Spiking neural network"
3030 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
3031 title = {A novel Hash algorithm construction based on chaotic neural network},
3032 journal = {Neural Computing and Applications},
3035 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
3038 keyword = {Computer Science},
3039 publisher = {Springer London}
3043 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
3044 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
3050 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
3051 doi={10.1109/TCE.2004.1309431},
3054 @article{Zhang2005759,
3055 title = "An image encryption approach based on chaotic maps",
3056 journal = "Chaos, Solitons \& Fractals",
3059 pages = "759 - 765",
3063 doi = "10.1016/j.chaos.2004.09.035",
3064 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
3067 @article{Lian20091296,
3068 title = "A block cipher based on chaotic neural networks",
3069 journal = "Neurocomputing",
3072 pages = "1296 - 1301",
3075 author = "Shiguo Lian",
3076 keywords = "Neural network",
3078 keywords = "Security",
3079 keywords = "Block cipher",
3080 keywords = "Image encryption"
3084 author = {George Cybenko},
3085 title = {Approximation by Superpositions of a Sigmoidal function},
3086 journal = {Mathematics of Control, Signals and Systems},
3093 @article{DBLP:journals/nn/HornikSW89,
3094 author = {Kurt Hornik and
3095 Maxwell B. Stinchcombe and
3097 title = {Multilayer feedforward networks are universal approximators},
3098 journal = {Neural Networks},
3103 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
3104 bibsource = {DBLP, http://dblp.uni-trier.de}
3107 @article{dalkiran10,
3108 author = {Ilker Dalkiran and Kenan Danisman},
3109 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
3110 title = {Artificial neural network based chaotic generator for cryptology},
3118 @article{springerlink:10.1007/s00521-010-0432-2,
3119 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
3120 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
3121 title = {A novel Hash algorithm construction based on chaotic neural network},
3122 journal = {Neural Computing and Applications},
3123 publisher = {Springer},
3125 keyword = {Computer Science},
3132 @article{Feder2009NTB,
3133 author = {Feder, Tom\'{a}s and Subi, Carlos},
3134 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
3135 journal = {Inf. Process. Lett.},
3136 issue_date = {February, 2009},
3144 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
3145 doi = {10.1016/j.ipl.2008.10.015},
3147 publisher = {Elsevier North-Holland, Inc.},
3148 address = {Amsterdam, The Netherlands, The Netherlands},
3149 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
3155 author={Zanten, A.~J.~van and Suparta, I.~N.},
3156 title={ Totally balanced and exponentially balanced Gray codes},
3157 journal={Discrete Analysis and Operational Research},
3165 @book{LevinPeresWilmer2006,
3166 added-at = {2010-01-19T17:51:27.000+0100},
3167 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
3168 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
3169 interhash = {61354795a6accb6407bfdbf04753a683},
3170 intrahash = {097dc4d1d0e412b2444f540b04110797},
3171 keywords = {markovchains probabilitytheory textbook},
3172 publisher = {American Mathematical Society},
3173 timestamp = {2010-01-19T17:51:27.000+0100},
3174 title = {{Markov chains and mixing times}},
3175 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
3180 author = {M. Mitzenmacher and Eli Upfal},
3182 title = {Probability and Computing},
3183 publisher = {Cambridge University Press},
3189 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3192 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
3193 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
3194 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
3200 @article{Robinson:1981:CS,
3201 author = {Robinson, John P. and Cohn, Martin},
3202 title = {Counting Sequences},
3203 journal = {IEEE Trans. Comput.},
3204 issue_date = {January 1981},
3212 url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
3214 publisher = {IEEE Computer Society},
3215 address = {Washington, DC, USA},
3216 keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
3218 @article{DBLP:journals/combinatorics/BhatS96,
3219 author = {Girish S. Bhat and
3221 title = {Balanced Gray Codes},
3222 journal = {Electr. J. Comb.},
3226 url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
3227 timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
3228 biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
3229 bibsource = {dblp computer science bibliography, http://dblp.org}
3234 @inproceedings{DBLP:conf/secrypt/MohammedCG16,
3235 author = {Bakiri, Mohammed and
3236 Couchot, Jean{-}Fran{\c{c}}ois and
3237 Guyeux, Christophe },
3238 title = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators
3239 based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study},
3240 booktitle = {Proceedings of the 13th International Joint Conference on e-Business
3241 and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
3242 Portugal, July 26-28, 2016.},
3245 crossref = {DBLP:conf/secrypt/2016},
3246 url = {http://dx.doi.org/10.5220/0005967903020309},
3247 doi = {10.5220/0005967903020309},
3248 timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
3249 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/MohammedCG16},
3250 bibsource = {dblp computer science bibliography, http://dblp.org}
3253 @proceedings{DBLP:conf/secrypt/2016,
3254 editor = {Christian Callegari and
3255 Marten van Sinderen and
3256 Panagiotis G. Sarigiannidis and
3257 Pierangela Samarati and
3260 Mohammad S. Obaidat},
3261 title = {Proceedings of the 13th International Joint Conference on e-Business
3262 and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
3263 Portugal, July 26-28, 2016},
3264 publisher = {SciTePress},
3266 isbn = {978-989-758-196-0},
3267 timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
3268 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2016},
3269 bibsource = {dblp computer science bibliography, http://dblp.org}
3273 author = {Sylvain Contassot{-}Vivier and
3274 Jean{-}Fran{\c{c}}ois Couchot and
3275 Christophe Guyeux and
3276 Pierre{-}Cyrille H{\'{e}}am},
3277 title = {Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom
3278 Number Generation: Theoretical and Practical Considerations},
3279 journal = {I. J. Bifurcation and Chaos},
3284 url = {https://doi.org/10.1142/S0218127417500146},
3285 doi = {10.1142/S0218127417500146},
3286 timestamp = {Fri, 26 May 2017 22:50:42 +0200},
3287 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ijbc/Contassot-Vivier17},
3288 bibsource = {dblp computer science bibliography, http://dblp.org}
3293 @article{Khan2014251,
3294 title = "A recent survey of reversible watermarking techniques ",
3295 journal = "Information Sciences ",
3298 pages = "251 - 272",
3302 doi = "http://dx.doi.org/10.1016/j.ins.2014.03.118",
3303 url = "http://www.sciencedirect.com/science/article/pii/S0020025514004150",
3304 author = "Asifullah Khan and Ayesha Siddiqa and Summuyya Munib and Sana Ambreen Malik",
3305 keywords = "Information hiding",
3306 keywords = "Histogram processing",
3307 keywords = "Reversible watermarking",
3308 keywords = "Error expansion",
3309 keywords = "Quantization",
3310 keywords = "Prediction error ",
3311 abstract = "Abstract The art of secretly hiding and communicating information has gained immense importance in the last two decades due to the advances in generation, storage, and communication technology of digital content. Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, watermarking can cause damage to the sensitive information present in the cover work. Therefore, at the receiving end, the exact recovery of cover work may not be possible. Additionally, there exist certain applications that may not tolerate even small distortions in cover work prior to the downstream processing. In such applications, reversible watermarking instead of conventional watermarking is employed. Reversible watermarking of digital content allows full extraction of the watermark along with the complete restoration of the cover work. For the last few years, reversible watermarking techniques are gaining popularity because of its increasing applications in some important and sensitive areas, i.e., military communication, healthcare, and law-enforcement. Due to the rapid evolution of reversible watermarking techniques, a latest review of recent research in this field is highly desirable. In this survey, the performances of different reversible watermarking schemes are discussed on the basis of various characteristics of watermarking. However, the major focus of this survey is on prediction-error expansion based reversible watermarking techniques, whereby the secret information is hidden in the prediction domain through error expansion. Comparison of the different reversible watermarking techniques is provided in tabular form, and an analysis is carried out. Additionally, experimental comparison of some of the recent reversible watermarking techniques, both in terms of watermarking properties and computational time, is provided on a dataset of 300 images. Future directions are also provided for this potentially important field of watermarking. "
3317 @inproceedings{DBLP:conf/automata/Contassot-Vivier17,
3318 author = {Sylvain Contassot{-}Vivier and
3319 Jean{-}Fran{\c{c}}ois Couchot},
3320 title = {Canonical Form of Gray Codes in N-cubes},
3321 booktitle = {Cellular Automata and Discrete Complex Systems - 23rd {IFIP} {WG}
3322 1.5 International Workshop, {AUTOMATA} 2017, Milan, Italy, June 7-9,
3326 crossref = {DBLP:conf/automata/2017},
3327 url = {https://doi.org/10.1007/978-3-319-58631-1_6},
3328 doi = {10.1007/978-3-319-58631-1_6},
3329 timestamp = {Wed, 24 May 2017 10:11:43 +0200},
3330 biburl = {http://dblp.uni-trier.de/rec/bib/conf/automata/Contassot-Vivier17},
3331 bibsource = {dblp computer science bibliography, http://dblp.org}
3334 @proceedings{DBLP:conf/automata/2017,
3335 editor = {Alberto Dennunzio and
3338 Antonio E. Porreca},
3339 title = {Cellular Automata and Discrete Complex Systems - 23rd {IFIP} {WG}
3340 1.5 International Workshop, {AUTOMATA} 2017, Milan, Italy, June 7-9,
3342 series = {Lecture Notes in Computer Science},
3344 publisher = {Springer},
3346 url = {https://doi.org/10.1007/978-3-319-58631-1},
3347 doi = {10.1007/978-3-319-58631-1},
3348 isbn = {978-3-319-58630-4},
3349 timestamp = {Wed, 24 May 2017 10:11:10 +0200},
3350 biburl = {http://dblp.uni-trier.de/rec/bib/conf/automata/2017},
3351 bibsource = {dblp computer science bibliography, http://dblp.org}
3356 @inproceedings{DBLP:conf/secrypt/BakiriCG17,
3357 author = {Mohammed Bakiri and
3358 Jean{-}Fran{\c{c}}ois Couchot and
3360 title = {One Random Jump and One Permutation: Sufficient Conditions to Chaotic,
3361 Statistically Faultless, and Large Throughput {PRNG} for {FPGA}},
3362 booktitle = {Proceedings of the 14th International Joint Conference on e-Business
3363 and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
3364 Spain, July 24-26, 2017.},
3367 crossref = {DBLP:conf/secrypt/2017},
3368 url = {https://doi.org/10.5220/0006418502950302},
3369 doi = {10.5220/0006418502950302},
3370 timestamp = {Thu, 17 Aug 2017 18:36:09 +0200},
3371 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/BakiriCG17},
3372 bibsource = {dblp computer science bibliography, http://dblp.org}
3375 @proceedings{DBLP:conf/secrypt/2017,
3376 editor = {Pierangela Samarati and
3377 Mohammad S. Obaidat and
3379 title = {Proceedings of the 14th International Joint Conference on e-Business
3380 and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
3381 Spain, July 24-26, 2017},
3382 publisher = {SciTePress},
3384 isbn = {978-989-758-259-2},
3385 timestamp = {Thu, 17 Aug 2017 18:31:18 +0200},
3386 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2017},
3387 bibsource = {dblp computer science bibliography, http://dblp.org}
3391 author={M. Bakiri and J. F. Couchot and C. Guyeux},
3392 journal={IEEE Transactions on Circuits and Systems I: Regular Papers},
3393 title={CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for F2; Linear Pseudorandom Number Generation Based on Zynq MPSoC},
3398 keywords={FPGA.;Pseudorandom number generators;applied cryptography;discrete dynamical systems;hardware security;statistical tests;system on chip},
3399 doi={10.1109/TCSI.2017.2754650},