1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
7 journal={Multimedia Tools and Applications},
8 title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
9 publisher={Springer US},
10 author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and
18 author = {Chen, Brian and Wornell, Gregory W.},
19 title = {Provably robust digital watermarking},
20 journal = {Proc. SPIE},
25 doi = {10.1117/12.371232},
26 URL = { http://dx.doi.org/10.1117/12.371232},
31 author={Darazi, R. and Hu, R. and Macq, B.},
32 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
33 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
36 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
37 doi={10.1109/ICASSP.2010.5495455},
41 @INPROCEEDINGS{WLSYNW13,
42 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
43 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
44 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
47 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
48 doi={10.1109/ICIP.2013.6738931},
55 journal={Journal of VLSI signal processing systems for signal, image and video technology},
58 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
59 publisher={Kluwer Academic Publishers},
60 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
61 author={Chen, Brian and Wornell, Gregory W.},
66 author = {Wang, C. T. and Tsai, W. H. },
67 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
70 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
85 @article{DBLP:journals/sigpro/LeeT10,
86 author = {I{-}Shi Lee and
88 title = {A new approach to covert communication via {PDF} files},
89 journal = {Signal Processing},
94 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
95 doi = {10.1016/j.sigpro.2009.07.022},
96 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
97 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
98 bibsource = {dblp computer science bibliography, http://dblp.org}
103 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
104 title = {A Copyright Protection Scheme Based on PDF},
105 journal = {International Journal of Innovative Computing, Information and Control},
112 note = {ISSN 1349-4198},
117 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
118 title = {Using Steganography to hide messages inside PDF files},
119 howpublished = {SSN Project Report},
125 @InProceedings{PD2008,
126 author = {POR, L. Y. and Delina, B.},
127 title = {Information Hiding: A New Approach in Text Steganography},
128 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
137 OPTorganization = {},
143 @article{DBLP:journals/tifs/PevnyBF10,
144 author = {Tom{\'{a}}s Pevn{\'{y}} and
146 Jessica J. Fridrich},
147 title = {Steganalysis by subtractive pixel adjacency matrix},
148 journal = {{IEEE} Transactions on Information Forensics and Security},
153 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
154 doi = {10.1109/TIFS.2010.2045842},
155 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
156 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
157 bibsource = {dblp computer science bibliography, http://dblp.org}
161 @INPROCEEDINGS{rifq/others03,
162 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
165 x-international-audience = {yes},
166 title = {{D}iscrimination power of measures of resemblance},
167 booktitle = {{IFSA}'03},
169 location = {Istanbul, Turkey}
173 @ARTICLE{Rifqi:2000:DPM:342947.342970,
174 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
177 x-international-audience = {yes},
178 title = {{D}iscrimination power of measures of comparison},
179 journal = {{F}uzzy {S}ets and {S}ystems},
187 @book{Anderberg-Cluster-1973,
188 added-at = {2008-10-29T00:31:48.000+0100},
189 author = {Anderberg, M. R.},
190 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
191 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
192 intrahash = {f586cc49441c591f06539d11d3e06006},
193 keywords = {cluster_analysis wismasys0809},
194 publisher = {Academic Press},
195 timestamp = {2008-10-29T00:31:48.000+0100},
196 title = {Cluster Analysis for Applications},
202 @article{yule1950introduction,
203 Author = {Yule, G.U. and Kendall, MG},
204 Date-Added = {2009-08-14 22:16:50 -0500},
205 Date-Modified = {2009-08-14 22:16:50 -0500},
206 Journal = {Statistics},
207 Title = {An Introduction to the Theory of},
211 @inproceedings{fgb11:ip,
213 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
216 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
217 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
218 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
220 address = {Sevilla, Spain},
221 editor = {Javier Lopez and Pierangela Samarati},
222 publisher = {SciTePress},
230 author = {Cayre, F. and Bas, P.},
231 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
232 journal = {IEEE Transactions on Information Forensics and Security},
237 doi = {10.1109/TIFS.2007.916006},
239 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
240 security, watermarking, Kerckhoffs-based embedding security classes,
241 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
242 steganography security, watermark-only-attack, watermarking, Security,
243 spread-spectrum (SS) watermarking},
245 timestamp = {2009.06.29}
247 @INPROCEEDINGS{Perez06,
248 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
249 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
251 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
263 author = {Cayre, F. and Fontaine, C. and Furon, T.},
264 title = {Watermarking security: theory and practice},
265 journal = {IEEE Transactions on Signal Processing},
268 pages = {3976--3987},
270 keywords = {blind source separation, cryptography, watermarking, Fisher information
271 matrix, blind source separation, cryptanalysis, information theory,
272 spread spectrum techniques, substitutive scheme, watermarking security,
273 Blind source separation, Fisher information matrix, equivocation,
274 security, watermarking}
279 @inproceedings{Shujun1,
280 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
281 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
282 Their Roles in Cryptography and Pseudo-Random Coding},
283 booktitle = {Cryptography and Coding, 8th IMA International Conference,
287 publisher = springer,
288 address = springer_loc,
296 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
299 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
300 title = {Random Walk in a N-cube Without Hamiltonian Cycle
301 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
303 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
311 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
314 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
315 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
316 howpublished = {in submission to the ACM Computing Surveys journal},
323 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
329 Couchot, Jean-Fran{\c}cois and
330 Couturier, Rapha\¨el},
331 title = {Blind digital watermarking in PDF documents using
332 Spread Transform Dither Modulation},
333 howpublished = {in submission to the Multimedia Tools and Applications journal},
342 @inproceedings{couchot04:onp,
344 author = {Couchot, Jean-Fran\c{c}ois},
345 title = {V\'erification d'invariant par superposition},
346 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
347 address = {Calais, France},
348 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
349 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
350 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
351 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
360 @inproceedings{aangc+15:ip,
362 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
365 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
366 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
367 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
369 doi = {10.1007/978-3-319-16483-0_38},
370 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
373 address = {Granada, Spain},
385 @inproceedings{agcs+15:ip,
387 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
390 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
391 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
392 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
393 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
395 series = {LNCS/LNBI},
397 publisher = {Springer},
398 address = {Mexico City, Mexico},
402 note = {To appear in the LNCS/LNBI series},
408 @inproceedings{bcg11:ip,
410 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
413 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
414 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
415 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
417 address = {Luxembourg, Luxembourg},
420 note = {Best paper award},
426 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
428 classement = {ACLNI},
431 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
432 title = {Quality analysis of a chaotic proven keyed hash function},
433 journal = {International Journal On Advances in Internet Technology},
445 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
450 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
451 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
452 journal = {Annals of Telecommunications},
453 doi = {10.1007/s12243-015-0466-7},
454 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
455 publisher = {Springer},
457 note = {Available online. Paper version to appear},
461 @inproceedings{fccg15:ip,
463 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
466 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
467 title = {Steganalyzer performances in operational contexts},
468 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
470 address = {Adelaide, Australia},
478 @inproceedings{bcfg12a:ip,
480 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
483 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
484 title = {Application of Steganography for Anonymity through the Internet},
485 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
487 url = {http://arxiv.org/abs/1202.5302v1},
488 address = {Venice, Italy},
495 @inproceedings{bcfg+13:ip,
497 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
500 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
501 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
502 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
504 doi = {10.1109/IIH-MSP.2013.141},
505 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
506 address = {Beijing, China},
512 @inproceedings{bcfg12b:ip,
514 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
517 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
518 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
519 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
521 address = {Venice, Italy},
531 @inproceedings{bcg11b:ip,
533 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
536 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
537 title = {Steganography: a Class of Algorithms having Secure Properties},
538 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
540 address = {Dalian, China},
549 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
552 impact-factor ={1.363},
553 isi-acro = {COMPUT J},
554 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
555 title = {Steganography: a class of secure and robust algorithms},
556 journal = {The Computer Journal},
560 doi = {10.1093/comjnl/bxr116},
561 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
562 publisher = {Oxford University Press},
568 @inproceedings{bcgw11:ip,
570 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
573 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
574 title = {Class of Trustworthy Pseudo Random Number Generators},
575 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
577 address = {Luxembourg, Luxembourg},
585 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
588 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
589 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
590 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
600 @inproceedings{aagp+15:ip,
602 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
604 classement = {ACTIN},
605 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
606 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
607 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
609 address = {Naples, Italy},
617 @inproceedings{acgm+14:ij,
619 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
622 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
623 title = {Finding the Core-Genes of Chloroplasts},
624 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
626 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
628 doi = {10.7763/IJBBB.2014.V4.371},
629 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
630 address = {Copenhagen, Denmark},
640 @inproceedings{akgcs+14:oip,
642 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
645 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
646 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
647 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
648 address = {Belfast, United Kingdom},
652 note = {Short paper},
657 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
660 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
661 title = {Finding the core-genes of Chloroplast Species},
662 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
672 @PhdThesis{guyeuxphd,
673 author = {Guyeux, Christophe},
674 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
675 type = {Th\`ese de {D}octorat},
676 school = {LIFC, Universit\'e de Franche-Comt\'e},
678 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
679 month = {13 décembre},
684 @inproceedings{chgw+14:oip,
686 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
688 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
689 title = {Pseudorandom Number Generators with Balanced Gray Codes},
690 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
692 address = {Vienna, Austria},
701 @INPROCEEDINGS{nusmv02,
702 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
703 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
704 Sebastiani and Armando Tacchella},
705 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
709 crossref = {DBLP:conf/cav/2002}
713 author = {Nishanth Chandrasekaran},
714 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
719 Author = "Gastin, P. and Oddoux, D.",
720 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
721 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
722 Publisher = "Springer",
729 @inproceedings{cg04:np,
731 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
732 title = {Analyse d'atteignabilit\'e d\'eductive},
733 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
735 editor = {Julliand, Jacques},
736 address = {Besan\c{c}on, France},
745 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
746 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
747 journal = {Journal of the Brazilian Computer Society (JBCS)},
751 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
754 note = {ISSN 0104-6500},
759 @inproceedings{cddg+04:ip,
761 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
763 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
764 title = {Proving and Debugging Set-Based Specifications},
765 booktitle = {WMF'03 proceedings},
766 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
769 editor = {A. Cavalcanti and P. Machado},
770 address = {Campina Grande, Brazil},
771 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
778 @inproceedings{cdgr04:onp,
780 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
781 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
783 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
784 address = {Besan\c{c}on, France},
787 editor = {Julliand, Jacques},
788 note = {Session outils},
793 @INPROCEEDINGS{CGK05,
794 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
795 title = {A uniform deductive approach for parameterized protocol safety},
799 bibsource = {DBLP, http://dblp.uni-trier.de},
800 crossref = {DBLP:conf/kbse/2005},
801 ee = {http://doi.acm.org/10.1145/1101908.1101971}
804 @INPROCEEDINGS{abcvs05,
805 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
806 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
808 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
812 address = {Guelph, Canada},
814 note = {ISSN 1492-8760}
818 author = {Bahi, J. M.},
819 title = {Boolean totally asynchronous iterations},
827 author = {Bahi, J. M. and Contassot-Vivier, S.},
828 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
838 author = {Bahi, J. M. and Contassot-Vivier, S.},
839 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
844 pages = {1353--1363},
849 @inproceedings{bcgr11:ip,
851 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
854 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
855 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
856 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
860 doi = {10.1007/978-3-642-22953-4_11},
861 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
862 address = {Oslo, Norway},
870 @techreport{BCVC10:ir,
871 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
872 title = {Convergence Results of Combining Synchronism and Asynchronism for
873 Discrete-State Discrete-Time Dynamic Network},
875 institution = {LIFC - Laboratoire d’{I}nformatique de
876 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
877 type = {Research Report},
878 number = {RR2010-02},
879 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
883 @techreport{Cou10:ir,
884 author = {Couchot, J.-F.},
885 title = {Formal {C}onvergence {P}roof for {D}iscrete
886 {D}ynamical {S}ystems},
887 institution = {LIFC - Laboratoire d’{I}nformatique de
888 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
889 type = {Research Report},
890 number = {RR2010-03},
891 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
899 author = {Bahi, J. M. and Michel, C.},
900 title = {Convergence of discrete asynchronous iterations},
901 journal = {International Journal Computer Mathematics},
908 author = {Bahi, J. M. and Michel, C.},
909 title = {Simulations of asynchronous evolution of discrete systems},
910 journal = {Simulation Practice and Theory},
918 author = {G\'{e}rard M. Baudet},
919 title = {Asynchronous Iterative Methods for Multiprocessors},
925 doi = {http://doi.acm.org/10.1145/322063.322067},
931 title = {Parallel and distributed computation: numerical methods},
932 publisher = prenticeHall,
934 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
935 isbn = {0-13-648700-9}
939 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
940 title = {The software model checker Blast},
948 @INPROCEEDINGS{LeCun85,
950 title = {A learning scheme for threshold networks},
951 booktitle = {Cognitiva'95},
954 address = {Paris, France}
958 author = {Jeffrey L. Elman},
959 title = {Finding Structure in Time},
960 journal = {Cognitive Science},
967 author = {Andreas Frommer and Daniel B. Szyld},
968 title = {On asynchronous iterations},
974 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
980 author = {Goles Ch., E. and Salinas,L.},
981 title = {Comparison between parallel and serial dynamics of Boolean networks},
990 title = {The SPIN Model Checker: Primer and Reference Manual},
991 publisher = {Addison-Wesley, Pearson Education},
993 author = {Gerard J. Holzmann}
997 author = {Shih M.-H. and Ho, J.-L.},
998 title = {Solution of the Boolean Markus-Yamabe Problem},
999 journal = advapplMath,
1007 author = {Adrien Richard},
1008 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1010 journal = advapplMath,
1015 publisher = elsevier
1019 author = {Adrien Richard and Jean-Paul Comet},
1020 title = {Necessary conditions for multistationarity in discrete dynamical
1022 journal = discreteapplMath,
1025 pages = {2403--2413},
1028 publisher = elsevier
1032 title = {Les syst\`emes dynamiques discrets},
1033 publisher = springer,
1035 author = {F. Robert},
1037 series = {Math\'ematiques et Applications}
1041 author = {Shih, M.-H. and Dong J.-L.},
1042 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1043 journal = advapplMath,
1052 author = {Thomas, R.},
1053 title = {Boolean Formalization of Genetic Control Circuits},
1061 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1062 title = {Absence of Cycles in Symmetric Neural Networks},
1066 pages = {1235-1249},
1068 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1071 @PROCEEDINGS{DBLP:conf/cav/2002,
1072 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1073 Denmark, July 27-31, 2002, Proceedings},
1075 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1078 publisher = springer,
1082 @PROCEEDINGS{DBLP:conf/kbse/2005,
1083 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1084 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1086 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1088 bibsource = {DBLP, http://dblp.uni-trier.de},
1093 author = {Ben-Ari, Mordechai},
1095 title = {Principles of the Spin Model Checker},
1096 isbn = {1846287693, 9781846287695}},
1097 publisher = springer,
1101 @INPROCEEDINGS{Wei97,
1102 author = {Weise,Carsten},
1103 title = {An incremental formal semantics for {PROMELA}},
1104 booktitle = {SPIN97, the Third SPIN Workshop},
1109 @PHDTHESIS{Couchot-PhD06,
1110 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1111 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1114 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1115 TYPE = {Th\`ese de {D}octorat},
1120 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1121 Page, M. and Tewfik, S. and Geiselmann, J.},
1122 title = {Qualitative simulation of genetic regulatory networks
1123 using piecewise-linear models},
1124 journal = {Bull. Math. Biol.},
1136 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1137 title = {A Fruitful Application of Formal Methods to Biological
1138 Regulatory Networks: Extending {T}homas' Asynchronous
1139 Logical Approach with Temporal Logic},
1140 journal = {J. Theor. Biol.},
1150 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1151 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1152 journal = {Biosystems},
1164 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1166 title = {Genetic Network Analyzer: qualitative simulation
1167 of genetic regulatory networks.},
1168 journal = {Bioinformatics},
1176 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1177 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1178 journal = {Genes, Genomes and Genomics},
1190 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1191 title = {Analysing formal models of genetic regulatory networks with delays},
1192 journal = {Int. J. Bioinformatics Res. Appl.},
1198 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1199 publisher = {Inderscience Publishers},
1200 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1203 author = {Richard, A.},
1204 title = {Local negative circuits and fixed points in Boolean networks},
1205 institution = {preprint arXiv number 0910.0750},
1218 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1219 title = {Graphic requirement for multistability and attractive cycles in a
1220 Boolean dynamical framework},
1221 journal = {Advances in Applied Mathematics},
1227 timestamp = {2009.02.05}
1230 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1231 author = {Jacques M. Bahi and
1232 Sylvain Contassot-Vivier and
1236 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1237 in Heterogeneous Environments},
1238 booktitle = {ICANN (2)},
1241 ee = {http://dx.doi.org/10.1007/11840930_81},
1242 crossref = {DBLP:conf/icann/2006-2},
1243 bibsource = {DBLP, http://dblp.uni-trier.de}
1246 @proceedings{DBLP:conf/icann/2006-2,
1247 editor = {Stefanos D. Kollias and
1248 Andreas Stafylopatis and
1251 title = {Artificial Neural Networks - ICANN 2006, 16th International
1252 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1254 booktitle = {ICANN (2)},
1255 publisher = {Springer},
1256 series = {Lecture Notes in Computer Science},
1259 isbn = {3-540-38871-0},
1260 bibsource = {DBLP, http://dblp.uni-trier.de}
1267 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1269 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1270 publisher = {Eyrolles},
1288 title = {An Introduction to Chaotic Dynamical Systems},
1289 publisher = {Redwood City: Addison-Wesley},
1291 author = {R. L. Devaney},
1294 timestamp = {27/01/2008}
1300 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1302 classement = {ACLI},
1303 impact-factor ={1.255},
1304 isi-acro = {MECHATRONICS},
1305 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1306 title = {Active {MEMS}-based flow control using artificial neural network},
1307 journal = {Mechatronics},
1311 doi = {10.1016/j.mechatronics.2013.02.010},
1312 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1313 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1314 publisher = {Elsevier},
1317 note = {Available online. Paper version to appear},
1322 @inproceedings{cds12:ip,
1324 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1326 classement = {ACTI},
1327 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1328 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1329 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1331 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1332 address = {Besan\c{c}on, France},
1333 publisher = {IEEE CPS},
1342 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1344 classement = {ACLI},
1345 impact-factor ={2.081},
1347 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1348 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1349 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1352 pages = {013122-1 -- 013122-9},
1353 doi = {10.1063/1.3685524},
1354 url = {http://dx.doi.org/10.1063/1.3685524},
1355 publisher = {American Institute of Physics},
1363 @inproceedings{bgs11:ip,
1365 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1367 classement = {ACTI},
1368 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1369 title = {Building a Chaotic Proven Neural Network},
1370 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1371 address = {Maldives, Maldives},
1377 author = {Bahi, Jacques M. and Guyeux, Christophe},
1378 title = {Hash Functions Using Chaotic Iterations},
1379 journal = {Journal of Algorithms \& Computational Technology},
1384 classement = {ACLNI},
1385 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1387 impact-factor = {#},
1394 @PHDTHESIS{GuyeuxThese10,
1395 author = {Christophe Guyeux},
1396 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1397 en s\'{e}curit\'{e} informatique},
1398 school = {Universit\'{e} de Franche-Comt\'{e}},
1400 owner = {christophe},
1401 timestamp = {2010.12.21}
1404 @INPROCEEDINGS{gfb10:ip,
1405 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1406 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1407 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1408 Multimedia Signal Processing},
1411 address = {Darmstadt, Germany},
1413 classement = {ACTI},
1414 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1421 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1422 title = {Topological entropy},
1423 journal = {Transactions of the American Mathematical Society},
1428 timestamp = {2008.05.29}
1432 author = {Rufus Bowen},
1433 title = {Entropy for group endomorphisms and homogeneous spaces},
1434 journal = {Transactions of the American Mathematical Society},
1439 timestamp = {15/02/2008}
1442 @article{10.1109/CIMSiM.2010.36,
1443 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1444 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1445 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1449 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1450 publisher = {IEEE Computer Society},
1451 address = {Los Alamitos, CA, USA},
1453 @article{10.1109/ICME.2003.1221665,
1454 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1455 title = {Neural network based steganalysis in still images},
1456 journal ={Multimedia and Expo, IEEE International Conference on},
1460 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1461 publisher = {IEEE Computer Society},
1462 address = {Los Alamitos, CA, USA},
1465 @ARTICLE{Sullivan06steganalysisfor,
1466 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1467 title = {Steganalysis for Markov cover data with applications to images},
1468 journal = {IEEE Transactions on Information Forensics and Security},
1477 author = "Gray, Frank",
1478 title = "Pulse code communication",
1479 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1484 @INPROCEEDINGS{guyeux10ter,
1485 author = {Bahi, Jacques M. and Guyeux, Christophe},
1486 title = {A new chaos-based watermarking algorithm},
1487 booktitle = {SECRYPT'10, International Conference on Security
1491 address = {Athens, Greece},
1493 publisher = {SciTePress},
1494 classement = {ACTI},
1495 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1501 @inproceedings{Qiao:2009:SM:1704555.1704664,
1502 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1503 title = {Steganalysis of MP3Stego},
1504 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1505 series = {IJCNN'09},
1507 location = {Atlanta, Georgia, USA},
1508 pages = {2723--2728},
1510 publisher = {IEEE Press}
1513 @inproceedings{CouchotD07IFM,
1515 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1518 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1519 title = {Guiding the Correction of Parameterized Specifications},
1520 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1524 publisher = {Springer},
1525 doi = {10.1007/978-3-540-73210-5_10},
1526 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1527 address = {Oxford, UK},
1533 @inproceedings{couchot07FTP,
1537 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1538 title = {A Graph-based Strategy for the Selection of Hypotheses},
1539 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1540 address = {Liverpool, UK},
1547 @inproceedings{cgs09:ip,
1549 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1551 classement = {ACTI},
1552 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1553 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1554 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1555 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1556 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1557 publisher = {ACM Press},
1559 url = {http://arxiv.org/abs/0907.1357},
1560 otherUrl = {http://hal.inria.fr/inria-00402204},
1561 address = {Grenoble, France},
1562 editor = {Hassen Sa\"{i}di and N. Shankar},
1569 @inproceedings{couchot07cade,
1573 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1574 title = {Handling Polymorphism in Automated Deduction},
1575 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1579 publisher = {Springer},
1580 isbn = {978-3-540-73594-6},
1581 doi = {10.1007/978-3-540-73595-3_18},
1582 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1583 address = {Bremen, Germany},
1595 @inproceedings{BCDG07,
1597 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1598 equipe = {vesontio},
1599 classement = {ACTI},
1600 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1601 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1602 booktitle = {B'2007, the 7th Int. B Conference},
1606 publisher = {Springer},
1607 doi = {10.1007/11955757_10},
1608 url = {http://dx.doi.org/10.1007/11955757_10},
1609 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1610 address = {Besancon, France},
1618 @article{byrd1995limited,
1619 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1620 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1621 journal = {SIAM J. Sci. Comput.},
1622 issue_date = {Sept. 1995},
1628 pages = {1190--1208},
1630 url = {http://dx.doi.org/10.1137/0916069},
1631 doi = {10.1137/0916069},
1633 publisher = {Society for Industrial and Applied Mathematics},
1634 address = {Philadelphia, PA, USA},
1635 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1638 @article{ANU:1770520,
1639 author = {Powell,M. J. D.},
1640 title = {Direct search algorithms for optimization calculations},
1641 journal = {Acta Numerica},
1648 doi = {10.1017/S0962492900002841},
1649 URL = {http://journals.cambridge.org/article_S0962492900002841},
1655 journal={The Journal of Supercomputing},
1658 doi={10.1007/s11227-010-0500-5},
1659 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1660 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1661 publisher={Springer US},
1662 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1663 author={Wang, Honggang},
1669 author={Yifeng He and Lee, I. and Ling Guan},
1670 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1671 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1676 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1677 doi={10.1109/TCSVT.2009.2017411},
1681 author={Palomar, D.P. and Mung Chiang},
1682 journal={Selected Areas in Communications, IEEE Journal on},
1683 title={A tutorial on decomposition methods for network utility maximization},
1688 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1689 doi={10.1109/JSAC.2006.879350},
1694 journal={EURASIP Journal on Information Security},
1698 doi={10.1186/1687-417X-2014-1},
1699 title={Universal distortion function for steganography in an arbitrary domain},
1700 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1701 publisher={Springer International Publishing},
1702 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1710 @inproceedings{conf/wifs/HolubF12,
1711 added-at = {2013-01-23T00:00:00.000+0100},
1712 author = {Holub, Vojtech and Fridrich, Jessica J.},
1713 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1715 crossref = {conf/wifs/2012},
1716 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1717 interhash = {cbef658a6868216eef585dd759ae0668},
1718 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1719 isbn = {978-1-4673-2285-0},
1723 timestamp = {2013-01-23T00:00:00.000+0100},
1724 title = {Designing steganographic distortion using directional filters.},
1725 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1729 @proceedings{conf/wifs/2012,
1730 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1731 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1732 publisher = {{IEEE}},
1734 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1735 isbn = {978-1-4673-2285-0},
1736 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1737 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1738 bibsource = {dblp computer science bibliography, http://dblp.org}
1742 @article{FillerJF11,
1743 author = {Tom{\'a}s Filler and
1745 Jessica J. Fridrich},
1746 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1748 journal = {IEEE Transactions on Information Forensics and Security},
1753 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1754 bibsource = {DBLP, http://dblp.uni-trier.de}
1757 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1758 editor = {Ira S. Moskowitz},
1759 author = {Shelby Pereira and
1760 Sviatoslav Voloshynovskiy and
1762 St{\'e}phane Marchand-Maillet and
1764 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1765 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1766 title = {Second Generation Benchmarking and Application Oriented
1771 publisher = springer,
1772 address = springer_loc,
1778 @inproceedings{DBLP:conf/ih/Westfeld01,
1779 added-at = {2011-06-28T00:00:00.000+0200},
1780 author = {Westfeld, Andreas},
1781 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1782 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1783 editor = {Ira S. Moskowitz},
1785 publisher = springer,
1786 address = springer_loc,
1789 title = {F5-A Steganographic Algorithm.},
1798 @article{Chang20101286,
1799 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1800 journal = "Digital Signal Processing",
1803 pages = "1286 - 1307",
1807 doi = "10.1016/j.dsp.2009.11.005",
1808 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1809 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1810 keywords = "Security",
1811 keywords = "Wet paper coding",
1812 keywords = "Steganography",
1813 keywords = "Indicator",
1814 keywords = "Fuzzy edge detector"
1819 @article{Hu:2007:HPE:1282866.1282944,
1820 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1821 title = {A high performance edge detector based on fuzzy inference rules},
1822 journal = {Inf. Sci.},
1823 issue_date = {November, 2007},
1829 pages = {4768--4784},
1831 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1832 doi = {10.1016/j.ins.2007.04.001},
1834 publisher = {Elsevier Science Inc.},
1835 address = {New York, NY, USA},
1836 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1840 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1841 author = {Sorina Dumitrescu and
1843 editor = {Ahmet M. Eskicioglu and
1844 Jessica J. Fridrich and
1846 title = {LSB steganalysis based on high-order statistics},
1847 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1848 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1851 address = {New York, NY, USA},
1854 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1855 bibsource = {DBLP, http://dblp.uni-trier.de}
1858 @inproceedings{DBLP:conf/ih/Ker05,
1859 author = {Andrew D. Ker},
1860 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1861 editor = {Mauro Barni and
1862 Jordi Herrera-Joancomart\'{\i} and
1863 Stefan Katzenbeisser and
1864 Fernando P{\'e}rez-Gonz{\'a}lez},
1865 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1866 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1869 ee = {http://dx.doi.org/10.1007/11558859_22},
1870 publisher = springer,
1871 address = springer_loc,
1878 @inproceedings{FK12,
1879 editor = {Matthias Kirchner and
1881 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1882 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1883 author = {Jessica J. Fridrich and
1885 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1889 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1891 publisher = springer,
1892 address = springer_loc,
1894 bibsource = {DBLP, http://dblp.uni-trier.de}
1898 @article{DBLP:journals/tsp/DumitrescuWW03,
1899 added-at = {2012-02-06T00:00:00.000+0100},
1900 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1901 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1902 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1903 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1904 intrahash = {556caad9b61980d3458885153a52321c},
1905 journal = {IEEE Transactions on Signal Processing},
1908 pages = {1995-2007},
1909 timestamp = {2012-02-06T00:00:00.000+0100},
1910 title = {Detection of LSB steganography via sample pair analysis.},
1911 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1919 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1920 editor = {Nicolas D. Georganas and
1921 Radu Popescu-Zeletin},
1922 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1923 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1925 author = {Jessica J. Fridrich and
1928 title = {Reliable detection of LSB steganography in color and grayscale
1932 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1934 address = {New York, NY, USA},
1936 bibsource = {DBLP, http://dblp.uni-trier.de}
1943 @inproceedings{DBLP:conf/ih/PevnyFB10,
1944 author = {Tom{\'a}s Pevn{\'y} and
1945 Tom{\'a}s Filler and
1947 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1949 editor = {Rainer B{\"o}hme and
1950 Philip W. L. Fong and
1951 Reihaneh Safavi-Naini},
1952 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1953 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1958 publisher = springer,
1959 address = springer_loc,
1962 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1963 bibsource = {DBLP, http://dblp.uni-trier.de}
1972 author = {Tom{\'a}s Pevn{\'y} and
1973 Tom{\'a}s Filler and
1976 title = {Break Our Steganographic System},
1977 OPThowpublished = {},
1980 note = {Available at \url{http://www.agents.cz/boss/}},
1984 @proceedings{DBLP:conf/ih/2010,
1985 editor = {Rainer B{\"o}hme and
1986 Philip W. L. Fong and
1987 Reihaneh Safavi-Naini},
1988 title = {Information Hiding - 12th International Conference, IH 2010,
1989 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1991 booktitle = {Information Hiding},
1992 publisher = springer,
1993 address = springer_loc,
1997 isbn = {978-3-642-16434-7},
1998 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1999 bibsource = {DBLP, http://dblp.uni-trier.de}
2003 @article{DBLP:journals/eswa/ChenCL10,
2004 added-at = {2010-07-21T15:44:10.000+0200},
2005 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2006 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2007 date = {2010-05-03},
2008 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2009 interhash = {bc34a5f04661fee24ee62c39e76361be},
2010 intrahash = {28889a4ab329da28559f0910469f054b},
2011 journal = {Expert Systems with Applications},
2014 pages = {3292-3301},
2015 timestamp = {2010-07-21T15:44:10.000+0200},
2016 title = {High payload steganography mechanism using hybrid edge detector.},
2017 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2022 @article{DBLP:journals/tifs/FillerJF11,
2023 added-at = {2011-09-29T00:00:00.000+0200},
2024 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2025 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2026 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2027 interhash = {b27d23ed0c9936d568e16c51378abccd},
2028 intrahash = {50e43c05a74eec17524b3df8db442da5},
2029 journal = {IEEE Transactions on Information Forensics and Security},
2033 timestamp = {2011-09-29T00:00:00.000+0200},
2034 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2035 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2043 @inproceedings{DBLP:conf/ih/KimDR06,
2044 added-at = {2007-09-20T00:00:00.000+0200},
2045 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2046 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2047 booktitle = {Information Hiding},
2048 crossref = {DBLP:conf/ih/2006},
2049 date = {2007-09-20},
2050 description = {dblp},
2051 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2052 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2053 interhash = {399aab122b39cfd6f6e951a1b276c786},
2054 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2055 isbn = {978-3-540-74123-7},
2059 publisher = springer,
2060 address = springer_loc,
2062 timestamp = {2007-09-20T00:00:00.000+0200},
2063 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2064 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2070 @proceedings{DBLP:conf/ih/2006,
2071 editor = {Jan Camenisch and
2072 Christian S. Collberg and
2075 title = {Information Hiding, 8th International Workshop, IH 2006,
2076 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2077 booktitle = {Information Hiding},
2078 publisher = springer,
2079 address = springer_loc,
2083 isbn = {978-3-540-74123-7},
2084 bibsource = {DBLP, http://dblp.uni-trier.de}
2089 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2090 author = {Jessica J. Fridrich and
2091 Tom{\'a}s Pevn{\'y} and
2093 title = {Statistically undetectable jpeg steganography: dead ends
2094 challenges, and opportunities},
2096 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2097 editor = {Deepa Kundur and
2098 Balakrishnan Prabhakaran and
2100 Jessica J. Fridrich},
2101 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2102 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2104 address = {New York, NY, USA},
2107 isbn = {978-1-59593-857-2},
2108 bibsource = {DBLP, http://dblp.uni-trier.de}
2114 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2115 editor = {Nasir D. Memon and
2117 Adnan M. Alattar and
2119 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2120 Electronic Imaging Symposium, San Jose, CA, USA, January
2121 18-20, 2010, Proceedings},
2122 author = {Tom{\'a}s Filler and
2124 Jessica J. Fridrich},
2125 title = {Minimizing embedding impact in steganography using trellis-coded
2129 ee = {http://dx.doi.org/10.1117/12.838002},
2130 bibsource = {DBLP, http://dblp.uni-trier.de},
2134 series = {SPIE Proceedings},
2145 @proceedings{DBLP:conf/mediaforensics/2010,
2146 editor = {Nasir D. Memon and
2148 Adnan M. Alattar and
2150 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2151 Electronic Imaging Symposium, San Jose, CA, USA, January
2152 18-20, 2010, Proceedings},
2153 booktitle = {Media Forensics and Security},
2156 series = {SPIE Proceedings},
2159 isbn = {978-0-8194-7934-1},
2160 bibsource = {DBLP, http://dblp.uni-trier.de}
2163 @article{DBLP:journals/corr/abs-1112-5239,
2164 author = {Jacques M. Bahi and
2165 Rapha{\"e}l Couturier and
2166 Christophe Guyeux and
2167 Pierre-Cyrille H{\'e}am},
2168 title = {Efficient and Cryptographically Secure Generation of Chaotic
2169 Pseudorandom Numbers on GPU},
2171 volume = {abs/1112.5239},
2173 ee = {http://arxiv.org/abs/1112.5239},
2174 bibsource = {DBLP, http://dblp.uni-trier.de}
2178 author = {Ponomarenko, Nikolay},
2179 title = {PSNR-HVS-M page},
2180 OPThowpublished = {},
2183 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2189 author = {Bovik, Alan C.},
2190 title = {BIQI page},
2191 OPThowpublished = {},
2194 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2199 @InProceedings{PSECAL07,
2200 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2201 title = {On between-coefficient contrast masking of DCT basis functions},
2202 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2205 editor = {Li,Baoxin},
2211 OPTorganization = {},
2219 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2220 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2221 journal = {IEEE Signal Processing Letters},
2232 @inproceedings{DBLP:conf/crypto/ShubBB82,
2233 author = {Lenore Blum and
2236 title = {Comparison of Two Pseudo-Random Number Generators},
2237 editor = {David Chaum and
2238 Ronald L. Rivest and
2240 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2241 Barbara, California, USA, August 23-25, 1982},
2243 bibsource = {DBLP, http://dblp.uni-trier.de},
2244 publisher = {Plenum Press},
2245 address={New York, NY, USA},
2248 bibsource = {DBLP, http://dblp.uni-trier.de}
2252 @inproceedings{Blum:1985:EPP:19478.19501,
2253 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2254 Barbara, California, USA, August 19-22, 1984, Proceedings},
2255 author = {Manuel Blum and
2257 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2258 Which Hides All Partial Information},
2262 editor = {G. R. Blakley and
2264 publisher = springer,
2265 address = springer_loc,
2272 @article{DBLP:journals/ejisec/FontaineG07,
2273 author = {Caroline Fontaine and
2275 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2276 journal = {EURASIP Journal on Information Security},
2281 ee = {http://dx.doi.org/10.1155/2007/13801},
2282 bibsource = {DBLP, http://dblp.uni-trier.de}
2286 @article{Luo:2010:EAI:1824719.1824720,
2287 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2288 title = {Edge adaptive image steganography based on LSB matching revisited},
2289 journal = {IEEE Transactions on Information Forensics and Security},
2297 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2298 doi = {10.1109/TIFS.2010.2041812},
2300 publisher = {IEEE Press},
2301 address = {Piscataway, NJ, USA},
2302 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2305 @article{Mielikainen06,
2306 author = {Mielikainen, J.},
2307 title = {LSB Matching Revisited},
2308 journal = {IEEE Signal Processing Letters},
2323 @article{Liu:2008:FMP:1284917.1285196,
2324 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2325 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2326 journal = {Pattern Recogn.},
2327 issue_date = {January, 2008},
2335 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2336 doi = {10.1016/j.patcog.2007.06.005},
2338 publisher = {Elsevier Science Inc.},
2339 address = {New York, NY, USA},
2340 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2345 @InProceedings{LHS08,
2346 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2347 title = {Textural features based universal steganalysis},
2350 booktitle = {Proc. SPIE 6819},
2361 OPTorganization = {},
2368 @InProceedings{KF11,
2369 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2370 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2373 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2377 pages = {78800L-78800L-13},
2386 OPTorganization = {},
2392 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2393 author = {Jan Kodovský and
2395 Jessica J. Fridrich},
2396 title = {Modern steganalysis can detect YASS.},
2397 booktitle = {Media Forensics and Security},
2400 ee = {http://dx.doi.org/10.1117/12.838768}
2403 @article{DBLP:journals/tifs/KodovskyFH12,
2404 author = {Jan Kodovsk{\'y} and
2405 Jessica J. Fridrich and
2407 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2408 journal = {IEEE Transactions on Information Forensics and Security},
2413 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2414 bibsource = {DBLP, http://dblp.uni-trier.de}
2419 @article{Fillatre:2012:ASL:2333143.2333587,
2420 author = {Fillatre, Lionel},
2421 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2422 journal = {IEEE Transactions on Signal Processing},
2430 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2431 doi = {10.1109/TSP.2011.2174231},
2433 publisher = {IEEE Press},
2434 address = {Piscataway, NJ, USA},
2438 @inproceedings{Tyan1993,
2439 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2440 address = ieecs_loc,
2442 author = {Tyan, C. Y. and Wang, P. P.},
2443 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2444 citeulike-article-id = {7936501},
2445 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2447 posted-at = {2010-10-01 17:27:48},
2450 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2456 @article{Canny:1986:CAE:11274.11275,
2457 author = {Canny, J},
2458 title = {A Computational Approach to Edge Detection},
2459 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2460 issue_date = {June 1986},
2468 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2469 doi = {10.1109/TPAMI.1986.4767851},
2471 publisher = {IEEE Computer Society},
2472 address = {Washington, DC, USA},
2473 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2477 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2478 author = {Jessica J. Fridrich and
2479 Jan Kodovsk{\'y} and
2482 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2484 booktitle = {Information Hiding},
2487 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2488 crossref = {DBLP:conf/ih/2011},
2489 bibsource = {DBLP, http://dblp.uni-trier.de}
2491 @proceedings{DBLP:conf/ih/2011,
2492 editor = {Tom{\'a}s Filler and
2493 Tom{\'a}s Pevn{\'y} and
2496 title = {Information Hiding - 13th International Conference, IH 2011,
2497 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2499 booktitle = {Information Hiding},
2500 publisher = springer,
2501 address = springer_loc,
2505 isbn = {978-3-642-24177-2},
2506 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2507 bibsource = {DBLP, http://dblp.uni-trier.de}
2510 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2511 author = {Jessica J. Fridrich},
2512 title = {Modern Trends in Steganography and Steganalysis},
2516 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2517 crossref = {DBLP:conf/iwdw/2011},
2518 bibsource = {DBLP, http://dblp.uni-trier.de}
2520 @proceedings{DBLP:conf/iwdw/2011,
2521 editor = {Yun-Qing Shi and
2522 Hyoung-Joong Kim and
2523 Fernando P{\'e}rez-Gonz{\'a}lez},
2524 title = {Digital Forensics and Watermarking - 10th International
2525 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2526 2011, Revised Selected Papers},
2528 publisher = springer,
2529 address = springer_loc,
2533 isbn = {978-3-642-32204-4},
2534 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2535 bibsource = {DBLP, http://dblp.uni-trier.de}
2541 @article{MCErlang07,
2542 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2543 title = {McErlang: a model checker for a distributed functional programming language},
2544 journal = {SIGPLAN Not.},
2553 @inproceedings{Bogor03,
2555 Matthew B. Dwyer and
2557 title = {Bogor: an extensible and highly-modular software model checking
2559 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2560 of Software Engineering 2003},
2568 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2569 title = {On Devaney's Definition of Chaos},
2570 journal = {Amer. Math. Monthly},
2576 timestamp = {27/01/2008}
2579 @article{Crook2007267,
2580 title = "Pattern recall in networks of chaotic neurons",
2581 journal = "Biosystems",
2584 pages = "267 - 274",
2587 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2588 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2590 keywords = "Spiking neural network"
2594 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2595 title = {A novel Hash algorithm construction based on chaotic neural network},
2596 journal = {Neural Computing and Applications},
2599 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2602 keyword = {Computer Science},
2603 publisher = {Springer London}
2607 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2608 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2614 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2615 doi={10.1109/TCE.2004.1309431},
2618 @article{Zhang2005759,
2619 title = "An image encryption approach based on chaotic maps",
2620 journal = "Chaos, Solitons \& Fractals",
2623 pages = "759 - 765",
2627 doi = "10.1016/j.chaos.2004.09.035",
2628 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2631 @article{Lian20091296,
2632 title = "A block cipher based on chaotic neural networks",
2633 journal = "Neurocomputing",
2636 pages = "1296 - 1301",
2639 author = "Shiguo Lian",
2640 keywords = "Neural network",
2642 keywords = "Security",
2643 keywords = "Block cipher",
2644 keywords = "Image encryption"
2648 author = {George Cybenko},
2649 title = {Approximation by Superpositions of a Sigmoidal function},
2650 journal = {Mathematics of Control, Signals and Systems},
2657 @article{DBLP:journals/nn/HornikSW89,
2658 author = {Kurt Hornik and
2659 Maxwell B. Stinchcombe and
2661 title = {Multilayer feedforward networks are universal approximators},
2662 journal = {Neural Networks},
2667 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2668 bibsource = {DBLP, http://dblp.uni-trier.de}
2671 @article{dalkiran10,
2672 author = {Ilker Dalkiran and Kenan Danisman},
2673 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2674 title = {Artificial neural network based chaotic generator for cryptology},
2682 @article{springerlink:10.1007/s00521-010-0432-2,
2683 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2684 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2685 title = {A novel Hash algorithm construction based on chaotic neural network},
2686 journal = {Neural Computing and Applications},
2687 publisher = {Springer},
2689 keyword = {Computer Science},
2695 @article{Feder2009NTB,
2696 author = {Feder, Tom\'{a}s and Subi, Carlos},
2697 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2698 journal = {Inf. Process. Lett.},
2699 issue_date = {February, 2009},
2707 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2708 doi = {10.1016/j.ipl.2008.10.015},
2710 publisher = {Elsevier North-Holland, Inc.},
2711 address = {Amsterdam, The Netherlands, The Netherlands},
2712 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2718 author={Zanten, A.~J.~van and Suparta, I.~N.},
2719 title={ Totally balanced and exponentially balanced Gray codes},
2720 journal={Discrete Analysis and Operational Research},
2728 @book{LevinPeresWilmer2006,
2729 added-at = {2010-01-19T17:51:27.000+0100},
2730 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2731 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2732 interhash = {61354795a6accb6407bfdbf04753a683},
2733 intrahash = {097dc4d1d0e412b2444f540b04110797},
2734 keywords = {markovchains probabilitytheory textbook},
2735 publisher = {American Mathematical Society},
2736 timestamp = {2010-01-19T17:51:27.000+0100},
2737 title = {{Markov chains and mixing times}},
2738 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2743 author = {M. Mitzenmacher and Eli Upfal},
2745 title = {Probability and Computing},
2746 publisher = {Cambridge University Press},
2752 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2755 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2756 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2757 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},