1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
7 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
10 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
11 title = {Random Walk in a N-cube Without Hamiltonian Cycle
12 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
14 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
22 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
25 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
26 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
27 howpublished = {in submission to the ACM Computing Surveys journal},
34 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
40 Couchot, Jean-Fran{\c}cois and
41 Couturier, Rapha\¨el},
42 title = {Blind digital watermarking in PDF documents using
43 Spread Transform Dither Modulation},
44 howpublished = {in submission to the Multimedia Tools and Applications journal},
53 @inproceedings{couchot04:onp,
55 author = {Couchot, Jean-Fran\c{c}ois},
56 title = {V\'erification d'invariant par superposition},
57 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
58 address = {Calais, France},
59 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
60 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
61 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
62 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
71 @inproceedings{aangc+15:ip,
73 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
76 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
77 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
78 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
80 doi = {10.1007/978-3-319-16483-0_38},
81 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
84 address = {Granada, Spain},
96 @inproceedings{agcs+15:ip,
98 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
101 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
102 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
103 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
104 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
106 series = {LNCS/LNBI},
108 publisher = {Springer},
109 address = {Mexico City, Mexico},
113 note = {To appear in the LNCS/LNBI series},
119 @inproceedings{bcg11:ip,
121 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
124 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
125 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
126 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
128 address = {Luxembourg, Luxembourg},
131 note = {Best paper award},
137 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
139 classement = {ACLNI},
142 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
143 title = {Quality analysis of a chaotic proven keyed hash function},
144 journal = {International Journal On Advances in Internet Technology},
156 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
161 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
162 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
163 journal = {Annals of Telecommunications},
164 doi = {10.1007/s12243-015-0466-7},
165 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
166 publisher = {Springer},
168 note = {Available online. Paper version to appear},
172 @inproceedings{fccg15:ip,
174 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
177 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
178 title = {Steganalyzer performances in operational contexts},
179 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
181 address = {Adelaide, Australia},
189 @inproceedings{bcfg12a:ip,
191 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
194 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
195 title = {Application of Steganography for Anonymity through the Internet},
196 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
198 url = {http://arxiv.org/abs/1202.5302v1},
199 address = {Venice, Italy},
206 @inproceedings{bcfg+13:ip,
208 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
211 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
212 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
213 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
215 doi = {10.1109/IIH-MSP.2013.141},
216 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
217 address = {Beijing, China},
223 @inproceedings{bcfg12b:ip,
225 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
228 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
229 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
230 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
232 address = {Venice, Italy},
242 @inproceedings{bcg11b:ip,
244 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
247 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
248 title = {Steganography: a Class of Algorithms having Secure Properties},
249 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
251 address = {Dalian, China},
260 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
263 impact-factor ={1.363},
264 isi-acro = {COMPUT J},
265 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
266 title = {Steganography: a class of secure and robust algorithms},
267 journal = {The Computer Journal},
271 doi = {10.1093/comjnl/bxr116},
272 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
273 publisher = {Oxford University Press},
279 @inproceedings{bcgw11:ip,
281 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
284 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
285 title = {Class of Trustworthy Pseudo Random Number Generators},
286 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
288 address = {Luxembourg, Luxembourg},
296 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
299 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
300 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
301 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
311 @inproceedings{aagp+15:ip,
313 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
315 classement = {ACTIN},
316 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
317 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
318 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
320 address = {Naples, Italy},
328 @inproceedings{acgm+14:ij,
330 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
333 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
334 title = {Finding the Core-Genes of Chloroplasts},
335 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
337 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
339 doi = {10.7763/IJBBB.2014.V4.371},
340 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
341 address = {Copenhagen, Denmark},
351 @inproceedings{akgcs+14:oip,
353 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
356 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
357 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
358 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
359 address = {Belfast, United Kingdom},
363 note = {Short paper},
368 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
371 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
372 title = {Finding the core-genes of Chloroplast Species},
373 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
383 @PhdThesis{guyeuxphd,
384 author = {Guyeux, Christophe},
385 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
386 type = {Th\`ese de {D}octorat},
387 school = {LIFC, Universit\'e de Franche-Comt\'e},
389 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
390 month = {13 décembre},
395 @inproceedings{chgw+14:oip,
397 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
399 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
400 title = {Pseudorandom Number Generators with Balanced Gray Codes},
401 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
403 address = {Vienna, Austria},
412 @INPROCEEDINGS{nusmv02,
413 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
414 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
415 Sebastiani and Armando Tacchella},
416 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
420 crossref = {DBLP:conf/cav/2002}
424 author = {Nishanth Chandrasekaran},
425 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
430 Author = "Gastin, P. and Oddoux, D.",
431 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
432 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
433 Publisher = "Springer",
440 @inproceedings{cg04:np,
442 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
443 title = {Analyse d'atteignabilit\'e d\'eductive},
444 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
446 editor = {Julliand, Jacques},
447 address = {Besan\c{c}on, France},
456 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
457 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
458 journal = {Journal of the Brazilian Computer Society (JBCS)},
462 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
465 note = {ISSN 0104-6500},
470 @inproceedings{cddg+04:ip,
472 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
474 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
475 title = {Proving and Debugging Set-Based Specifications},
476 booktitle = {WMF'03 proceedings},
477 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
480 editor = {A. Cavalcanti and P. Machado},
481 address = {Campina Grande, Brazil},
482 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
489 @inproceedings{cdgr04:onp,
491 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
492 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
494 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
495 address = {Besan\c{c}on, France},
498 editor = {Julliand, Jacques},
499 note = {Session outils},
504 @INPROCEEDINGS{CGK05,
505 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
506 title = {A uniform deductive approach for parameterized protocol safety},
510 bibsource = {DBLP, http://dblp.uni-trier.de},
511 crossref = {DBLP:conf/kbse/2005},
512 ee = {http://doi.acm.org/10.1145/1101908.1101971}
515 @INPROCEEDINGS{abcvs05,
516 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
517 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
519 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
523 address = {Guelph, Canada},
525 note = {ISSN 1492-8760}
529 author = {Bahi, J. M.},
530 title = {Boolean totally asynchronous iterations},
538 author = {Bahi, J. M. and Contassot-Vivier, S.},
539 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
549 author = {Bahi, J. M. and Contassot-Vivier, S.},
550 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
555 pages = {1353--1363},
560 @inproceedings{bcgr11:ip,
562 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
565 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
566 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
567 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
571 doi = {10.1007/978-3-642-22953-4_11},
572 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
573 address = {Oslo, Norway},
581 @techreport{BCVC10:ir,
582 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
583 title = {Convergence Results of Combining Synchronism and Asynchronism for
584 Discrete-State Discrete-Time Dynamic Network},
586 institution = {LIFC - Laboratoire d’{I}nformatique de
587 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
588 type = {Research Report},
589 number = {RR2010-02},
590 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
594 @techreport{Cou10:ir,
595 author = {Couchot, J.-F.},
596 title = {Formal {C}onvergence {P}roof for {D}iscrete
597 {D}ynamical {S}ystems},
598 institution = {LIFC - Laboratoire d’{I}nformatique de
599 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
600 type = {Research Report},
601 number = {RR2010-03},
602 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
610 author = {Bahi, J. M. and Michel, C.},
611 title = {Convergence of discrete asynchronous iterations},
612 journal = {International Journal Computer Mathematics},
619 author = {Bahi, J. M. and Michel, C.},
620 title = {Simulations of asynchronous evolution of discrete systems},
621 journal = {Simulation Practice and Theory},
629 author = {G\'{e}rard M. Baudet},
630 title = {Asynchronous Iterative Methods for Multiprocessors},
636 doi = {http://doi.acm.org/10.1145/322063.322067},
642 title = {Parallel and distributed computation: numerical methods},
643 publisher = prenticeHall,
645 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
646 isbn = {0-13-648700-9}
650 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
651 title = {The software model checker Blast},
659 @INPROCEEDINGS{LeCun85,
661 title = {A learning scheme for threshold networks},
662 booktitle = {Cognitiva'95},
665 address = {Paris, France}
669 author = {Jeffrey L. Elman},
670 title = {Finding Structure in Time},
671 journal = {Cognitive Science},
678 author = {Andreas Frommer and Daniel B. Szyld},
679 title = {On asynchronous iterations},
685 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
691 author = {Goles Ch., E. and Salinas,L.},
692 title = {Comparison between parallel and serial dynamics of Boolean networks},
701 title = {The SPIN Model Checker: Primer and Reference Manual},
702 publisher = {Addison-Wesley, Pearson Education},
704 author = {Gerard J. Holzmann}
708 author = {Shih M.-H. and Ho, J.-L.},
709 title = {Solution of the Boolean Markus-Yamabe Problem},
710 journal = advapplMath,
718 author = {Adrien Richard},
719 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
721 journal = advapplMath,
730 author = {Adrien Richard and Jean-Paul Comet},
731 title = {Necessary conditions for multistationarity in discrete dynamical
733 journal = discreteapplMath,
736 pages = {2403--2413},
743 title = {Les syst\`emes dynamiques discrets},
744 publisher = springer,
746 author = {F. Robert},
748 series = {Math\'ematiques et Applications}
752 author = {Shih, M.-H. and Dong J.-L.},
753 title = {A combinatorial analogue of the Jacobian problem in automata networks},
754 journal = advapplMath,
763 author = {Thomas, R.},
764 title = {Boolean Formalization of Genetic Control Circuits},
772 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
773 title = {Absence of Cycles in Symmetric Neural Networks},
779 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
782 @PROCEEDINGS{DBLP:conf/cav/2002,
783 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
784 Denmark, July 27-31, 2002, Proceedings},
786 editor = {Ed Brinksma and Kim Guldstrand Larsen},
789 publisher = springer,
793 @PROCEEDINGS{DBLP:conf/kbse/2005,
794 title = {20th IEEE/ACM International Conference on Automated Software Engineering
795 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
797 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
799 bibsource = {DBLP, http://dblp.uni-trier.de},
804 author = {Ben-Ari, Mordechai},
806 title = {Principles of the Spin Model Checker},
807 isbn = {1846287693, 9781846287695}},
808 publisher = springer,
812 @INPROCEEDINGS{Wei97,
813 author = {Weise,Carsten},
814 title = {An incremental formal semantics for {PROMELA}},
815 booktitle = {SPIN97, the Third SPIN Workshop},
820 @PHDTHESIS{Couchot-PhD06,
821 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
822 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
825 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
826 TYPE = {Th\`ese de {D}octorat},
831 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
832 Page, M. and Tewfik, S. and Geiselmann, J.},
833 title = {Qualitative simulation of genetic regulatory networks
834 using piecewise-linear models},
835 journal = {Bull. Math. Biol.},
847 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
848 title = {A Fruitful Application of Formal Methods to Biological
849 Regulatory Networks: Extending {T}homas' Asynchronous
850 Logical Approach with Temporal Logic},
851 journal = {J. Theor. Biol.},
861 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
862 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
863 journal = {Biosystems},
875 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
877 title = {Genetic Network Analyzer: qualitative simulation
878 of genetic regulatory networks.},
879 journal = {Bioinformatics},
887 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
888 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
889 journal = {Genes, Genomes and Genomics},
901 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
902 title = {Analysing formal models of genetic regulatory networks with delays},
903 journal = {Int. J. Bioinformatics Res. Appl.},
909 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
910 publisher = {Inderscience Publishers},
911 address = {Inderscience Publishers, Geneva, SWITZERLAND},
914 author = {Richard, A.},
915 title = {Local negative circuits and fixed points in Boolean networks},
916 institution = {preprint arXiv number 0910.0750},
929 author = {Remy, R. and Ruet, P. and Thieffry, D.},
930 title = {Graphic requirement for multistability and attractive cycles in a
931 Boolean dynamical framework},
932 journal = {Advances in Applied Mathematics},
938 timestamp = {2009.02.05}
941 @inproceedings{DBLP:conf/icann/BahiCMMS06,
942 author = {Jacques M. Bahi and
943 Sylvain Contassot-Vivier and
947 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
948 in Heterogeneous Environments},
949 booktitle = {ICANN (2)},
952 ee = {http://dx.doi.org/10.1007/11840930_81},
953 crossref = {DBLP:conf/icann/2006-2},
954 bibsource = {DBLP, http://dblp.uni-trier.de}
957 @proceedings{DBLP:conf/icann/2006-2,
958 editor = {Stefanos D. Kollias and
959 Andreas Stafylopatis and
962 title = {Artificial Neural Networks - ICANN 2006, 16th International
963 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
965 booktitle = {ICANN (2)},
966 publisher = {Springer},
967 series = {Lecture Notes in Computer Science},
970 isbn = {3-540-38871-0},
971 bibsource = {DBLP, http://dblp.uni-trier.de}
978 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
980 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
981 publisher = {Eyrolles},
999 title = {An Introduction to Chaotic Dynamical Systems},
1000 publisher = {Redwood City: Addison-Wesley},
1002 author = {R. L. Devaney},
1005 timestamp = {27/01/2008}
1011 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1013 classement = {ACLI},
1014 impact-factor ={1.255},
1015 isi-acro = {MECHATRONICS},
1016 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1017 title = {Active {MEMS}-based flow control using artificial neural network},
1018 journal = {Mechatronics},
1022 doi = {10.1016/j.mechatronics.2013.02.010},
1023 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1024 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1025 publisher = {Elsevier},
1028 note = {Available online. Paper version to appear},
1033 @inproceedings{cds12:ip,
1035 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1037 classement = {ACTI},
1038 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1039 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1040 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1042 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1043 address = {Besan\c{c}on, France},
1044 publisher = {IEEE CPS},
1053 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1055 classement = {ACLI},
1056 impact-factor ={2.081},
1058 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1059 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1060 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1063 pages = {013122-1 -- 013122-9},
1064 doi = {10.1063/1.3685524},
1065 url = {http://dx.doi.org/10.1063/1.3685524},
1066 publisher = {American Institute of Physics},
1074 @inproceedings{bgs11:ip,
1076 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1078 classement = {ACTI},
1079 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1080 title = {Building a Chaotic Proven Neural Network},
1081 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1082 address = {Maldives, Maldives},
1088 author = {Bahi, Jacques M. and Guyeux, Christophe},
1089 title = {Hash Functions Using Chaotic Iterations},
1090 journal = {Journal of Algorithms \& Computational Technology},
1095 classement = {ACLNI},
1096 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1098 impact-factor = {#},
1105 @PHDTHESIS{GuyeuxThese10,
1106 author = {Christophe Guyeux},
1107 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1108 en s\'{e}curit\'{e} informatique},
1109 school = {Universit\'{e} de Franche-Comt\'{e}},
1111 owner = {christophe},
1112 timestamp = {2010.12.21}
1115 @INPROCEEDINGS{gfb10:ip,
1116 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1117 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1118 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1119 Multimedia Signal Processing},
1122 address = {Darmstadt, Germany},
1124 classement = {ACTI},
1125 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1132 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1133 title = {Topological entropy},
1134 journal = {Transactions of the American Mathematical Society},
1139 timestamp = {2008.05.29}
1143 author = {Rufus Bowen},
1144 title = {Entropy for group endomorphisms and homogeneous spaces},
1145 journal = {Transactions of the American Mathematical Society},
1150 timestamp = {15/02/2008}
1153 @article{10.1109/CIMSiM.2010.36,
1154 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1155 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1156 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1160 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1161 publisher = {IEEE Computer Society},
1162 address = {Los Alamitos, CA, USA},
1164 @article{10.1109/ICME.2003.1221665,
1165 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1166 title = {Neural network based steganalysis in still images},
1167 journal ={Multimedia and Expo, IEEE International Conference on},
1171 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1172 publisher = {IEEE Computer Society},
1173 address = {Los Alamitos, CA, USA},
1176 @ARTICLE{Sullivan06steganalysisfor,
1177 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1178 title = {Steganalysis for Markov cover data with applications to images},
1179 journal = {IEEE Transactions on Information Forensics and Security},
1188 author = "Gray, Frank",
1189 title = "Pulse code communication",
1190 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1195 @INPROCEEDINGS{guyeux10ter,
1196 author = {Bahi, Jacques M. and Guyeux, Christophe},
1197 title = {A new chaos-based watermarking algorithm},
1198 booktitle = {SECRYPT'10, International Conference on Security
1202 address = {Athens, Greece},
1204 publisher = {SciTePress},
1205 classement = {ACTI},
1206 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1212 @inproceedings{Qiao:2009:SM:1704555.1704664,
1213 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1214 title = {Steganalysis of MP3Stego},
1215 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1216 series = {IJCNN'09},
1218 location = {Atlanta, Georgia, USA},
1219 pages = {2723--2728},
1221 publisher = {IEEE Press}
1224 @inproceedings{CouchotD07IFM,
1226 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1229 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1230 title = {Guiding the Correction of Parameterized Specifications},
1231 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1235 publisher = {Springer},
1236 doi = {10.1007/978-3-540-73210-5_10},
1237 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1238 address = {Oxford, UK},
1244 @inproceedings{couchot07FTP,
1248 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1249 title = {A Graph-based Strategy for the Selection of Hypotheses},
1250 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1251 address = {Liverpool, UK},
1258 @inproceedings{cgs09:ip,
1260 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1262 classement = {ACTI},
1263 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1264 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1265 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1266 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1267 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1268 publisher = {ACM Press},
1270 url = {http://arxiv.org/abs/0907.1357},
1271 otherUrl = {http://hal.inria.fr/inria-00402204},
1272 address = {Grenoble, France},
1273 editor = {Hassen Sa\"{i}di and N. Shankar},
1280 @inproceedings{couchot07cade,
1284 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1285 title = {Handling Polymorphism in Automated Deduction},
1286 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1290 publisher = {Springer},
1291 isbn = {978-3-540-73594-6},
1292 doi = {10.1007/978-3-540-73595-3_18},
1293 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1294 address = {Bremen, Germany},
1306 @inproceedings{BCDG07,
1308 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1309 equipe = {vesontio},
1310 classement = {ACTI},
1311 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1312 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1313 booktitle = {B'2007, the 7th Int. B Conference},
1317 publisher = {Springer},
1318 doi = {10.1007/11955757_10},
1319 url = {http://dx.doi.org/10.1007/11955757_10},
1320 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1321 address = {Besancon, France},
1329 @article{byrd1995limited,
1330 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1331 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1332 journal = {SIAM J. Sci. Comput.},
1333 issue_date = {Sept. 1995},
1339 pages = {1190--1208},
1341 url = {http://dx.doi.org/10.1137/0916069},
1342 doi = {10.1137/0916069},
1344 publisher = {Society for Industrial and Applied Mathematics},
1345 address = {Philadelphia, PA, USA},
1346 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1349 @article{ANU:1770520,
1350 author = {Powell,M. J. D.},
1351 title = {Direct search algorithms for optimization calculations},
1352 journal = {Acta Numerica},
1359 doi = {10.1017/S0962492900002841},
1360 URL = {http://journals.cambridge.org/article_S0962492900002841},
1366 journal={The Journal of Supercomputing},
1369 doi={10.1007/s11227-010-0500-5},
1370 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1371 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1372 publisher={Springer US},
1373 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1374 author={Wang, Honggang},
1380 author={Yifeng He and Lee, I. and Ling Guan},
1381 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1382 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1387 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1388 doi={10.1109/TCSVT.2009.2017411},
1392 author={Palomar, D.P. and Mung Chiang},
1393 journal={Selected Areas in Communications, IEEE Journal on},
1394 title={A tutorial on decomposition methods for network utility maximization},
1399 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1400 doi={10.1109/JSAC.2006.879350},
1405 journal={EURASIP Journal on Information Security},
1409 doi={10.1186/1687-417X-2014-1},
1410 title={Universal distortion function for steganography in an arbitrary domain},
1411 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1412 publisher={Springer International Publishing},
1413 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1417 @inproceedings{conf/wifs/HolubF12,
1418 added-at = {2013-01-23T00:00:00.000+0100},
1419 author = {Holub, Vojtech and Fridrich, Jessica J.},
1420 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1422 crossref = {conf/wifs/2012},
1423 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1424 interhash = {cbef658a6868216eef585dd759ae0668},
1425 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1426 isbn = {978-1-4673-2285-0},
1430 timestamp = {2013-01-23T00:00:00.000+0100},
1431 title = {Designing steganographic distortion using directional filters.},
1432 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1439 @article{FillerJF11,
1440 author = {Tom{\'a}s Filler and
1442 Jessica J. Fridrich},
1443 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1445 journal = {IEEE Transactions on Information Forensics and Security},
1450 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1451 bibsource = {DBLP, http://dblp.uni-trier.de}
1454 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1455 editor = {Ira S. Moskowitz},
1456 author = {Shelby Pereira and
1457 Sviatoslav Voloshynovskiy and
1459 St{\'e}phane Marchand-Maillet and
1461 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1462 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1463 title = {Second Generation Benchmarking and Application Oriented
1468 publisher = springer,
1469 address = springer_loc,
1475 @inproceedings{DBLP:conf/ih/Westfeld01,
1476 added-at = {2011-06-28T00:00:00.000+0200},
1477 author = {Westfeld, Andreas},
1478 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1479 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1480 editor = {Ira S. Moskowitz},
1482 publisher = springer,
1483 address = springer_loc,
1486 title = {F5-A Steganographic Algorithm.},
1495 @article{Chang20101286,
1496 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1497 journal = "Digital Signal Processing",
1500 pages = "1286 - 1307",
1504 doi = "10.1016/j.dsp.2009.11.005",
1505 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1506 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1507 keywords = "Security",
1508 keywords = "Wet paper coding",
1509 keywords = "Steganography",
1510 keywords = "Indicator",
1511 keywords = "Fuzzy edge detector"
1516 @article{Hu:2007:HPE:1282866.1282944,
1517 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1518 title = {A high performance edge detector based on fuzzy inference rules},
1519 journal = {Inf. Sci.},
1520 issue_date = {November, 2007},
1526 pages = {4768--4784},
1528 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1529 doi = {10.1016/j.ins.2007.04.001},
1531 publisher = {Elsevier Science Inc.},
1532 address = {New York, NY, USA},
1533 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1537 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1538 author = {Sorina Dumitrescu and
1540 editor = {Ahmet M. Eskicioglu and
1541 Jessica J. Fridrich and
1543 title = {LSB steganalysis based on high-order statistics},
1544 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1545 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1548 address = {New York, NY, USA},
1551 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1552 bibsource = {DBLP, http://dblp.uni-trier.de}
1555 @inproceedings{DBLP:conf/ih/Ker05,
1556 author = {Andrew D. Ker},
1557 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1558 editor = {Mauro Barni and
1559 Jordi Herrera-Joancomart\'{\i} and
1560 Stefan Katzenbeisser and
1561 Fernando P{\'e}rez-Gonz{\'a}lez},
1562 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1563 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1566 ee = {http://dx.doi.org/10.1007/11558859_22},
1567 publisher = springer,
1568 address = springer_loc,
1575 @inproceedings{FK12,
1576 editor = {Matthias Kirchner and
1578 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1579 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1580 author = {Jessica J. Fridrich and
1582 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1586 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1588 publisher = springer,
1589 address = springer_loc,
1591 bibsource = {DBLP, http://dblp.uni-trier.de}
1595 @article{DBLP:journals/tsp/DumitrescuWW03,
1596 added-at = {2012-02-06T00:00:00.000+0100},
1597 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1598 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1599 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1600 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1601 intrahash = {556caad9b61980d3458885153a52321c},
1602 journal = {IEEE Transactions on Signal Processing},
1605 pages = {1995-2007},
1606 timestamp = {2012-02-06T00:00:00.000+0100},
1607 title = {Detection of LSB steganography via sample pair analysis.},
1608 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1616 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1617 editor = {Nicolas D. Georganas and
1618 Radu Popescu-Zeletin},
1619 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1620 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1622 author = {Jessica J. Fridrich and
1625 title = {Reliable detection of LSB steganography in color and grayscale
1629 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1631 address = {New York, NY, USA},
1633 bibsource = {DBLP, http://dblp.uni-trier.de}
1640 @inproceedings{DBLP:conf/ih/PevnyFB10,
1641 author = {Tom{\'a}s Pevn{\'y} and
1642 Tom{\'a}s Filler and
1644 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1646 editor = {Rainer B{\"o}hme and
1647 Philip W. L. Fong and
1648 Reihaneh Safavi-Naini},
1649 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1650 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1655 publisher = springer,
1656 address = springer_loc,
1659 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1660 bibsource = {DBLP, http://dblp.uni-trier.de}
1669 author = {Tom{\'a}s Pevn{\'y} and
1670 Tom{\'a}s Filler and
1673 title = {Break Our Steganographic System},
1674 OPThowpublished = {},
1677 note = {Available at \url{http://www.agents.cz/boss/}},
1681 @proceedings{DBLP:conf/ih/2010,
1682 editor = {Rainer B{\"o}hme and
1683 Philip W. L. Fong and
1684 Reihaneh Safavi-Naini},
1685 title = {Information Hiding - 12th International Conference, IH 2010,
1686 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1688 booktitle = {Information Hiding},
1689 publisher = springer,
1690 address = springer_loc,
1694 isbn = {978-3-642-16434-7},
1695 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1696 bibsource = {DBLP, http://dblp.uni-trier.de}
1700 @article{DBLP:journals/eswa/ChenCL10,
1701 added-at = {2010-07-21T15:44:10.000+0200},
1702 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1703 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1704 date = {2010-05-03},
1705 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1706 interhash = {bc34a5f04661fee24ee62c39e76361be},
1707 intrahash = {28889a4ab329da28559f0910469f054b},
1708 journal = {Expert Systems with Applications},
1711 pages = {3292-3301},
1712 timestamp = {2010-07-21T15:44:10.000+0200},
1713 title = {High payload steganography mechanism using hybrid edge detector.},
1714 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1719 @article{DBLP:journals/tifs/FillerJF11,
1720 added-at = {2011-09-29T00:00:00.000+0200},
1721 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1722 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1723 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1724 interhash = {b27d23ed0c9936d568e16c51378abccd},
1725 intrahash = {50e43c05a74eec17524b3df8db442da5},
1726 journal = {IEEE Transactions on Information Forensics and Security},
1730 timestamp = {2011-09-29T00:00:00.000+0200},
1731 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1732 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1740 @inproceedings{DBLP:conf/ih/KimDR06,
1741 added-at = {2007-09-20T00:00:00.000+0200},
1742 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1743 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1744 booktitle = {Information Hiding},
1745 crossref = {DBLP:conf/ih/2006},
1746 date = {2007-09-20},
1747 description = {dblp},
1748 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1749 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1750 interhash = {399aab122b39cfd6f6e951a1b276c786},
1751 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1752 isbn = {978-3-540-74123-7},
1756 publisher = springer,
1757 address = springer_loc,
1759 timestamp = {2007-09-20T00:00:00.000+0200},
1760 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1761 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1767 @proceedings{DBLP:conf/ih/2006,
1768 editor = {Jan Camenisch and
1769 Christian S. Collberg and
1772 title = {Information Hiding, 8th International Workshop, IH 2006,
1773 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1774 booktitle = {Information Hiding},
1775 publisher = springer,
1776 address = springer_loc,
1780 isbn = {978-3-540-74123-7},
1781 bibsource = {DBLP, http://dblp.uni-trier.de}
1786 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1787 author = {Jessica J. Fridrich and
1788 Tom{\'a}s Pevn{\'y} and
1790 title = {Statistically undetectable jpeg steganography: dead ends
1791 challenges, and opportunities},
1793 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1794 editor = {Deepa Kundur and
1795 Balakrishnan Prabhakaran and
1797 Jessica J. Fridrich},
1798 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1799 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1801 address = {New York, NY, USA},
1804 isbn = {978-1-59593-857-2},
1805 bibsource = {DBLP, http://dblp.uni-trier.de}
1811 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1812 editor = {Nasir D. Memon and
1814 Adnan M. Alattar and
1816 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1817 Electronic Imaging Symposium, San Jose, CA, USA, January
1818 18-20, 2010, Proceedings},
1819 author = {Tom{\'a}s Filler and
1821 Jessica J. Fridrich},
1822 title = {Minimizing embedding impact in steganography using trellis-coded
1826 ee = {http://dx.doi.org/10.1117/12.838002},
1827 bibsource = {DBLP, http://dblp.uni-trier.de},
1831 series = {SPIE Proceedings},
1842 @proceedings{DBLP:conf/mediaforensics/2010,
1843 editor = {Nasir D. Memon and
1845 Adnan M. Alattar and
1847 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1848 Electronic Imaging Symposium, San Jose, CA, USA, January
1849 18-20, 2010, Proceedings},
1850 booktitle = {Media Forensics and Security},
1853 series = {SPIE Proceedings},
1856 isbn = {978-0-8194-7934-1},
1857 bibsource = {DBLP, http://dblp.uni-trier.de}
1860 @article{DBLP:journals/corr/abs-1112-5239,
1861 author = {Jacques M. Bahi and
1862 Rapha{\"e}l Couturier and
1863 Christophe Guyeux and
1864 Pierre-Cyrille H{\'e}am},
1865 title = {Efficient and Cryptographically Secure Generation of Chaotic
1866 Pseudorandom Numbers on GPU},
1868 volume = {abs/1112.5239},
1870 ee = {http://arxiv.org/abs/1112.5239},
1871 bibsource = {DBLP, http://dblp.uni-trier.de}
1875 author = {Ponomarenko, Nikolay},
1876 title = {PSNR-HVS-M page},
1877 OPThowpublished = {},
1880 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1886 author = {Bovik, Alan C.},
1887 title = {BIQI page},
1888 OPThowpublished = {},
1891 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1896 @InProceedings{PSECAL07,
1897 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1898 title = {On between-coefficient contrast masking of DCT basis functions},
1899 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1902 editor = {Li,Baoxin},
1908 OPTorganization = {},
1916 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1917 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1918 journal = {IEEE Signal Processing Letters},
1929 @inproceedings{DBLP:conf/crypto/ShubBB82,
1930 author = {Lenore Blum and
1933 title = {Comparison of Two Pseudo-Random Number Generators},
1934 editor = {David Chaum and
1935 Ronald L. Rivest and
1937 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1938 Barbara, California, USA, August 23-25, 1982},
1940 bibsource = {DBLP, http://dblp.uni-trier.de},
1941 publisher = {Plenum Press},
1942 address={New York, NY, USA},
1945 bibsource = {DBLP, http://dblp.uni-trier.de}
1949 @inproceedings{Blum:1985:EPP:19478.19501,
1950 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1951 Barbara, California, USA, August 19-22, 1984, Proceedings},
1952 author = {Manuel Blum and
1954 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1955 Which Hides All Partial Information},
1959 editor = {G. R. Blakley and
1961 publisher = springer,
1962 address = springer_loc,
1969 @article{DBLP:journals/ejisec/FontaineG07,
1970 author = {Caroline Fontaine and
1972 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1973 journal = {EURASIP Journal on Information Security},
1978 ee = {http://dx.doi.org/10.1155/2007/13801},
1979 bibsource = {DBLP, http://dblp.uni-trier.de}
1983 @article{Luo:2010:EAI:1824719.1824720,
1984 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1985 title = {Edge adaptive image steganography based on LSB matching revisited},
1986 journal = {IEEE Transactions on Information Forensics and Security},
1994 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1995 doi = {10.1109/TIFS.2010.2041812},
1997 publisher = {IEEE Press},
1998 address = {Piscataway, NJ, USA},
1999 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2002 @article{Mielikainen06,
2003 author = {Mielikainen, J.},
2004 title = {LSB Matching Revisited},
2005 journal = {IEEE Signal Processing Letters},
2020 @article{Liu:2008:FMP:1284917.1285196,
2021 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2022 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2023 journal = {Pattern Recogn.},
2024 issue_date = {January, 2008},
2032 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2033 doi = {10.1016/j.patcog.2007.06.005},
2035 publisher = {Elsevier Science Inc.},
2036 address = {New York, NY, USA},
2037 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2042 @InProceedings{LHS08,
2043 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2044 title = {Textural features based universal steganalysis},
2047 booktitle = {Proc. SPIE 6819},
2058 OPTorganization = {},
2065 @InProceedings{KF11,
2066 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2067 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2070 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2074 pages = {78800L-78800L-13},
2083 OPTorganization = {},
2089 @article{DBLP:journals/tifs/KodovskyFH12,
2090 author = {Jan Kodovsk{\'y} and
2091 Jessica J. Fridrich and
2093 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2094 journal = {IEEE Transactions on Information Forensics and Security},
2099 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2100 bibsource = {DBLP, http://dblp.uni-trier.de}
2105 @article{Fillatre:2012:ASL:2333143.2333587,
2106 author = {Fillatre, Lionel},
2107 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2108 journal = {IEEE Transactions on Signal Processing},
2116 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2117 doi = {10.1109/TSP.2011.2174231},
2119 publisher = {IEEE Press},
2120 address = {Piscataway, NJ, USA},
2124 @inproceedings{Tyan1993,
2125 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2126 address = ieecs_loc,
2128 author = {Tyan, C. Y. and Wang, P. P.},
2129 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2130 citeulike-article-id = {7936501},
2131 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2133 posted-at = {2010-10-01 17:27:48},
2136 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2142 @article{Canny:1986:CAE:11274.11275,
2143 author = {Canny, J},
2144 title = {A Computational Approach to Edge Detection},
2145 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2146 issue_date = {June 1986},
2154 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2155 doi = {10.1109/TPAMI.1986.4767851},
2157 publisher = {IEEE Computer Society},
2158 address = {Washington, DC, USA},
2159 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2163 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2164 author = {Jessica J. Fridrich and
2165 Jan Kodovsk{\'y} and
2168 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2170 booktitle = {Information Hiding},
2173 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2174 crossref = {DBLP:conf/ih/2011},
2175 bibsource = {DBLP, http://dblp.uni-trier.de}
2177 @proceedings{DBLP:conf/ih/2011,
2178 editor = {Tom{\'a}s Filler and
2179 Tom{\'a}s Pevn{\'y} and
2182 title = {Information Hiding - 13th International Conference, IH 2011,
2183 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2185 booktitle = {Information Hiding},
2186 publisher = springer,
2187 address = springer_loc,
2191 isbn = {978-3-642-24177-2},
2192 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2193 bibsource = {DBLP, http://dblp.uni-trier.de}
2196 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2197 author = {Jessica J. Fridrich},
2198 title = {Modern Trends in Steganography and Steganalysis},
2202 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2203 crossref = {DBLP:conf/iwdw/2011},
2204 bibsource = {DBLP, http://dblp.uni-trier.de}
2206 @proceedings{DBLP:conf/iwdw/2011,
2207 editor = {Yun-Qing Shi and
2208 Hyoung-Joong Kim and
2209 Fernando P{\'e}rez-Gonz{\'a}lez},
2210 title = {Digital Forensics and Watermarking - 10th International
2211 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2212 2011, Revised Selected Papers},
2214 publisher = springer,
2215 address = springer_loc,
2219 isbn = {978-3-642-32204-4},
2220 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2221 bibsource = {DBLP, http://dblp.uni-trier.de}
2227 @article{MCErlang07,
2228 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2229 title = {McErlang: a model checker for a distributed functional programming language},
2230 journal = {SIGPLAN Not.},
2239 @inproceedings{Bogor03,
2241 Matthew B. Dwyer and
2243 title = {Bogor: an extensible and highly-modular software model checking
2245 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2246 of Software Engineering 2003},
2254 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2255 title = {On Devaney's Definition of Chaos},
2256 journal = {Amer. Math. Monthly},
2262 timestamp = {27/01/2008}
2265 @article{Crook2007267,
2266 title = "Pattern recall in networks of chaotic neurons",
2267 journal = "Biosystems",
2270 pages = "267 - 274",
2273 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2274 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2276 keywords = "Spiking neural network"
2280 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2281 title = {A novel Hash algorithm construction based on chaotic neural network},
2282 journal = {Neural Computing and Applications},
2285 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2288 keyword = {Computer Science},
2289 publisher = {Springer London}
2293 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2294 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2300 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2301 doi={10.1109/TCE.2004.1309431},
2304 @article{Zhang2005759,
2305 title = "An image encryption approach based on chaotic maps",
2306 journal = "Chaos, Solitons \& Fractals",
2309 pages = "759 - 765",
2313 doi = "10.1016/j.chaos.2004.09.035",
2314 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2317 @article{Lian20091296,
2318 title = "A block cipher based on chaotic neural networks",
2319 journal = "Neurocomputing",
2322 pages = "1296 - 1301",
2325 author = "Shiguo Lian",
2326 keywords = "Neural network",
2328 keywords = "Security",
2329 keywords = "Block cipher",
2330 keywords = "Image encryption"
2334 author = {George Cybenko},
2335 title = {Approximation by Superpositions of a Sigmoidal function},
2336 journal = {Mathematics of Control, Signals and Systems},
2343 @article{DBLP:journals/nn/HornikSW89,
2344 author = {Kurt Hornik and
2345 Maxwell B. Stinchcombe and
2347 title = {Multilayer feedforward networks are universal approximators},
2348 journal = {Neural Networks},
2353 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2354 bibsource = {DBLP, http://dblp.uni-trier.de}
2357 @article{dalkiran10,
2358 author = {Ilker Dalkiran and Kenan Danisman},
2359 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2360 title = {Artificial neural network based chaotic generator for cryptology},
2368 @article{springerlink:10.1007/s00521-010-0432-2,
2369 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2370 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2371 title = {A novel Hash algorithm construction based on chaotic neural network},
2372 journal = {Neural Computing and Applications},
2373 publisher = {Springer},
2375 keyword = {Computer Science},
2381 @article{Feder2009NTB,
2382 author = {Feder, Tom\'{a}s and Subi, Carlos},
2383 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2384 journal = {Inf. Process. Lett.},
2385 issue_date = {February, 2009},
2393 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2394 doi = {10.1016/j.ipl.2008.10.015},
2396 publisher = {Elsevier North-Holland, Inc.},
2397 address = {Amsterdam, The Netherlands, The Netherlands},
2398 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2404 author={Zanten, A.~J.~van and Suparta, I.~N.},
2405 title={ Totally balanced and exponentially balanced Gray codes},
2406 journal={Discrete Analysis and Operational Research},
2414 @book{LevinPeresWilmer2006,
2415 added-at = {2010-01-19T17:51:27.000+0100},
2416 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2417 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2418 interhash = {61354795a6accb6407bfdbf04753a683},
2419 intrahash = {097dc4d1d0e412b2444f540b04110797},
2420 keywords = {markovchains probabilitytheory textbook},
2421 publisher = {American Mathematical Society},
2422 timestamp = {2010-01-19T17:51:27.000+0100},
2423 title = {{Markov chains and mixing times}},
2424 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2429 author = {M. Mitzenmacher and Eli Upfal},
2431 title = {Probability and Computing},
2432 publisher = {Cambridge University Press},
2438 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2441 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2442 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2443 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},