1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
11 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
12 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
13 journal = {Annals of Telecommunications},
14 doi = {10.1007/s12243-015-0466-7},
15 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
16 publisher = {Springer},
18 note = {Available online. Paper version to appear},
22 @inproceedings{fccg15:ip,
24 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
27 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
28 title = {Steganalyzer performances in operational contexts},
29 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
31 address = {Adelaide, Australia},
39 @inproceedings{bcfg12a:ip,
41 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
44 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
45 title = {Application of Steganography for Anonymity through the Internet},
46 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
48 url = {http://arxiv.org/abs/1202.5302v1},
49 address = {Venice, Italy},
56 @inproceedings{bcfg+13:ip,
58 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
61 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
62 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
63 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
65 doi = {10.1109/IIH-MSP.2013.141},
66 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
67 address = {Beijing, China},
73 @inproceedings{bcfg12b:ip,
75 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
78 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
79 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
80 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
82 address = {Venice, Italy},
92 @inproceedings{bcg11b:ip,
94 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
97 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
98 title = {Steganography: a Class of Algorithms having Secure Properties},
99 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
101 address = {Dalian, China},
110 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
113 impact-factor ={1.363},
114 isi-acro = {COMPUT J},
115 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
116 title = {Steganography: a class of secure and robust algorithms},
117 journal = {The Computer Journal},
121 doi = {10.1093/comjnl/bxr116},
122 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
123 publisher = {Oxford University Press},
129 @inproceedings{bcgw11:ip,
131 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
134 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
135 title = {Class of Trustworthy Pseudo Random Number Generators},
136 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
138 address = {Luxembourg, Luxembourg},
146 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
149 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
150 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
151 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
159 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
160 Michel Salomon, Jacques M Bahi},
161 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
164 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
172 address = {Belfast, UK},
173 OPTorganization = {},
181 @PhdThesis{guyeuxphd,
182 author = {Guyeux, Christophe},
183 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
184 type = {Th\`ese de {D}octorat},
185 school = {LIFC, Universit\'e de Franche-Comt\'e},
187 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
188 month = {13 décembre},
193 @inproceedings{chgw+14:oip,
195 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
197 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
198 title = {Pseudorandom Number Generators with Balanced Gray Codes},
199 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
201 address = {Vienna, Austria},
210 @INPROCEEDINGS{nusmv02,
211 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
212 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
213 Sebastiani and Armando Tacchella},
214 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
218 crossref = {DBLP:conf/cav/2002}
222 author = {Nishanth Chandrasekaran},
223 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
228 Author = "Gastin, P. and Oddoux, D.",
229 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
230 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
231 Publisher = "Springer",
238 @INPROCEEDINGS{CGK05,
239 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
240 title = {A uniform deductive approach for parameterized protocol safety},
244 bibsource = {DBLP, http://dblp.uni-trier.de},
245 crossref = {DBLP:conf/kbse/2005},
246 ee = {http://doi.acm.org/10.1145/1101908.1101971}
249 @INPROCEEDINGS{abcvs05,
250 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
251 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
253 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
257 address = {Guelph, Canada},
259 note = {ISSN 1492-8760}
263 author = {Bahi, J. M.},
264 title = {Boolean totally asynchronous iterations},
272 author = {Bahi, J. M. and Contassot-Vivier, S.},
273 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
283 author = {Bahi, J. M. and Contassot-Vivier, S.},
284 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
289 pages = {1353--1363},
294 @inproceedings{bcgr11:ip,
296 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
299 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
300 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
301 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
305 doi = {10.1007/978-3-642-22953-4_11},
306 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
307 address = {Oslo, Norway},
315 @techreport{BCVC10:ir,
316 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
317 title = {Convergence Results of Combining Synchronism and Asynchronism for
318 Discrete-State Discrete-Time Dynamic Network},
320 institution = {LIFC - Laboratoire d’{I}nformatique de
321 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
322 type = {Research Report},
323 number = {RR2010-02},
324 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
328 @techreport{Cou10:ir,
329 author = {Couchot, J.-F.},
330 title = {Formal {C}onvergence {P}roof for {D}iscrete
331 {D}ynamical {S}ystems},
332 institution = {LIFC - Laboratoire d’{I}nformatique de
333 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
334 type = {Research Report},
335 number = {RR2010-03},
336 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
344 author = {Bahi, J. M. and Michel, C.},
345 title = {Convergence of discrete asynchronous iterations},
346 journal = {International Journal Computer Mathematics},
353 author = {Bahi, J. M. and Michel, C.},
354 title = {Simulations of asynchronous evolution of discrete systems},
355 journal = {Simulation Practice and Theory},
363 author = {G\'{e}rard M. Baudet},
364 title = {Asynchronous Iterative Methods for Multiprocessors},
370 doi = {http://doi.acm.org/10.1145/322063.322067},
376 title = {Parallel and distributed computation: numerical methods},
377 publisher = prenticeHall,
379 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
380 isbn = {0-13-648700-9}
384 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
385 title = {The software model checker Blast},
393 @INPROCEEDINGS{LeCun85,
395 title = {A learning scheme for threshold networks},
396 booktitle = {Cognitiva'95},
399 address = {Paris, France}
403 author = {Jeffrey L. Elman},
404 title = {Finding Structure in Time},
405 journal = {Cognitive Science},
412 author = {Andreas Frommer and Daniel B. Szyld},
413 title = {On asynchronous iterations},
419 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
425 author = {Goles Ch., E. and Salinas,L.},
426 title = {Comparison between parallel and serial dynamics of Boolean networks},
435 title = {The SPIN Model Checker: Primer and Reference Manual},
436 publisher = {Addison-Wesley, Pearson Education},
438 author = {Gerard J. Holzmann}
442 author = {Shih M.-H. and Ho, J.-L.},
443 title = {Solution of the Boolean Markus-Yamabe Problem},
444 journal = advapplMath,
452 author = {Adrien Richard},
453 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
455 journal = advapplMath,
464 author = {Adrien Richard and Jean-Paul Comet},
465 title = {Necessary conditions for multistationarity in discrete dynamical
467 journal = discreteapplMath,
470 pages = {2403--2413},
477 title = {Les syst\`emes dynamiques discrets},
478 publisher = springer,
480 author = {F. Robert},
482 series = {Math\'ematiques et Applications}
486 author = {Shih, M.-H. and Dong J.-L.},
487 title = {A combinatorial analogue of the Jacobian problem in automata networks},
488 journal = advapplMath,
497 author = {Thomas, R.},
498 title = {Boolean Formalization of Genetic Control Circuits},
506 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
507 title = {Absence of Cycles in Symmetric Neural Networks},
513 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
516 @PROCEEDINGS{DBLP:conf/cav/2002,
517 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
518 Denmark, July 27-31, 2002, Proceedings},
520 editor = {Ed Brinksma and Kim Guldstrand Larsen},
523 publisher = springer,
527 @PROCEEDINGS{DBLP:conf/kbse/2005,
528 title = {20th IEEE/ACM International Conference on Automated Software Engineering
529 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
531 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
533 bibsource = {DBLP, http://dblp.uni-trier.de},
538 author = {Ben-Ari, Mordechai},
540 title = {Principles of the Spin Model Checker},
541 isbn = {1846287693, 9781846287695}},
542 publisher = springer,
546 @INPROCEEDINGS{Wei97,
547 author = {Weise,Carsten},
548 title = {An incremental formal semantics for {PROMELA}},
549 booktitle = {SPIN97, the Third SPIN Workshop},
554 @PHDTHESIS{Couchot-PhD06,
555 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
556 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
559 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
560 TYPE = {Th\`ese de {D}octorat},
565 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
566 Page, M. and Tewfik, S. and Geiselmann, J.},
567 title = {Qualitative simulation of genetic regulatory networks
568 using piecewise-linear models},
569 journal = {Bull. Math. Biol.},
581 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
582 title = {A Fruitful Application of Formal Methods to Biological
583 Regulatory Networks: Extending {T}homas' Asynchronous
584 Logical Approach with Temporal Logic},
585 journal = {J. Theor. Biol.},
595 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
596 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
597 journal = {Biosystems},
609 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
611 title = {Genetic Network Analyzer: qualitative simulation
612 of genetic regulatory networks.},
613 journal = {Bioinformatics},
621 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
622 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
623 journal = {Genes, Genomes and Genomics},
635 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
636 title = {Analysing formal models of genetic regulatory networks with delays},
637 journal = {Int. J. Bioinformatics Res. Appl.},
643 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
644 publisher = {Inderscience Publishers},
645 address = {Inderscience Publishers, Geneva, SWITZERLAND},
648 author = {Richard, A.},
649 title = {Local negative circuits and fixed points in Boolean networks},
650 institution = {preprint arXiv number 0910.0750},
663 author = {Remy, R. and Ruet, P. and Thieffry, D.},
664 title = {Graphic requirement for multistability and attractive cycles in a
665 Boolean dynamical framework},
666 journal = {Advances in Applied Mathematics},
672 timestamp = {2009.02.05}
675 @inproceedings{DBLP:conf/icann/BahiCMMS06,
676 author = {Jacques M. Bahi and
677 Sylvain Contassot-Vivier and
681 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
682 in Heterogeneous Environments},
683 booktitle = {ICANN (2)},
686 ee = {http://dx.doi.org/10.1007/11840930_81},
687 crossref = {DBLP:conf/icann/2006-2},
688 bibsource = {DBLP, http://dblp.uni-trier.de}
691 @proceedings{DBLP:conf/icann/2006-2,
692 editor = {Stefanos D. Kollias and
693 Andreas Stafylopatis and
696 title = {Artificial Neural Networks - ICANN 2006, 16th International
697 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
699 booktitle = {ICANN (2)},
700 publisher = {Springer},
701 series = {Lecture Notes in Computer Science},
704 isbn = {3-540-38871-0},
705 bibsource = {DBLP, http://dblp.uni-trier.de}
712 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
714 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
715 publisher = {Eyrolles},
733 title = {An Introduction to Chaotic Dynamical Systems},
734 publisher = {Redwood City: Addison-Wesley},
736 author = {R. L. Devaney},
739 timestamp = {27/01/2008}
745 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
748 impact-factor ={1.255},
749 isi-acro = {MECHATRONICS},
750 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
751 title = {Active {MEMS}-based flow control using artificial neural network},
752 journal = {Mechatronics},
756 doi = {10.1016/j.mechatronics.2013.02.010},
757 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
758 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
759 publisher = {Elsevier},
762 note = {Available online. Paper version to appear},
767 @inproceedings{cds12:ip,
769 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
772 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
773 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
774 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
776 editor = {Bourgeois, Julien and de Labachelerie, Michel},
777 address = {Besan\c{c}on, France},
778 publisher = {IEEE CPS},
787 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
790 impact-factor ={2.081},
792 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
793 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
794 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
797 pages = {013122-1 -- 013122-9},
798 doi = {10.1063/1.3685524},
799 url = {http://dx.doi.org/10.1063/1.3685524},
800 publisher = {American Institute of Physics},
808 @inproceedings{bgs11:ip,
810 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
813 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
814 title = {Building a Chaotic Proven Neural Network},
815 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
816 address = {Maldives, Maldives},
822 author = {Bahi, Jacques M. and Guyeux, Christophe},
823 title = {Hash Functions Using Chaotic Iterations},
824 journal = {Journal of Algorithms \& Computational Technology},
829 classement = {ACLNI},
830 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
839 @PHDTHESIS{GuyeuxThese10,
840 author = {Christophe Guyeux},
841 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
842 en s\'{e}curit\'{e} informatique},
843 school = {Universit\'{e} de Franche-Comt\'{e}},
845 owner = {christophe},
846 timestamp = {2010.12.21}
849 @INPROCEEDINGS{gfb10:ip,
850 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
851 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
852 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
853 Multimedia Signal Processing},
856 address = {Darmstadt, Germany},
859 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
866 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
867 title = {Topological entropy},
868 journal = {Transactions of the American Mathematical Society},
873 timestamp = {2008.05.29}
877 author = {Rufus Bowen},
878 title = {Entropy for group endomorphisms and homogeneous spaces},
879 journal = {Transactions of the American Mathematical Society},
884 timestamp = {15/02/2008}
887 @article{10.1109/CIMSiM.2010.36,
888 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
889 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
890 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
894 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
895 publisher = {IEEE Computer Society},
896 address = {Los Alamitos, CA, USA},
898 @article{10.1109/ICME.2003.1221665,
899 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
900 title = {Neural network based steganalysis in still images},
901 journal ={Multimedia and Expo, IEEE International Conference on},
905 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
906 publisher = {IEEE Computer Society},
907 address = {Los Alamitos, CA, USA},
910 @ARTICLE{Sullivan06steganalysisfor,
911 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
912 title = {Steganalysis for Markov cover data with applications to images},
913 journal = {IEEE Transactions on Information Forensics and Security},
922 author = "Gray, Frank",
923 title = "Pulse code communication",
924 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
929 @INPROCEEDINGS{guyeux10ter,
930 author = {Bahi, Jacques M. and Guyeux, Christophe},
931 title = {A new chaos-based watermarking algorithm},
932 booktitle = {SECRYPT'10, International Conference on Security
936 address = {Athens, Greece},
938 publisher = {SciTePress},
940 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
946 @inproceedings{Qiao:2009:SM:1704555.1704664,
947 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
948 title = {Steganalysis of MP3Stego},
949 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
952 location = {Atlanta, Georgia, USA},
953 pages = {2723--2728},
955 publisher = {IEEE Press}
958 @inproceedings{CouchotD07IFM,
960 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
963 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
964 title = {Guiding the Correction of Parameterized Specifications},
965 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
969 publisher = {Springer},
970 doi = {10.1007/978-3-540-73210-5_10},
971 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
972 address = {Oxford, UK},
978 @inproceedings{couchot07FTP,
982 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
983 title = {A Graph-based Strategy for the Selection of Hypotheses},
984 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
985 address = {Liverpool, UK},
992 @inproceedings{cgs09:ip,
994 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
997 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
998 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
999 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1000 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1001 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1002 publisher = {ACM Press},
1004 url = {http://arxiv.org/abs/0907.1357},
1005 otherUrl = {http://hal.inria.fr/inria-00402204},
1006 address = {Grenoble, France},
1007 editor = {Hassen Sa\"{i}di and N. Shankar},
1014 @inproceedings{couchot07cade,
1018 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1019 title = {Handling Polymorphism in Automated Deduction},
1020 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1024 publisher = {Springer},
1025 isbn = {978-3-540-73594-6},
1026 doi = {10.1007/978-3-540-73595-3_18},
1027 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1028 address = {Bremen, Germany},
1040 @inproceedings{BCDG07,
1042 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1043 equipe = {vesontio},
1044 classement = {ACTI},
1045 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1046 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1047 booktitle = {B'2007, the 7th Int. B Conference},
1051 publisher = {Springer},
1052 doi = {10.1007/11955757_10},
1053 url = {http://dx.doi.org/10.1007/11955757_10},
1054 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1055 address = {Besancon, France},
1063 @article{byrd1995limited,
1064 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1065 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1066 journal = {SIAM J. Sci. Comput.},
1067 issue_date = {Sept. 1995},
1073 pages = {1190--1208},
1075 url = {http://dx.doi.org/10.1137/0916069},
1076 doi = {10.1137/0916069},
1078 publisher = {Society for Industrial and Applied Mathematics},
1079 address = {Philadelphia, PA, USA},
1080 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1083 @article{ANU:1770520,
1084 author = {Powell,M. J. D.},
1085 title = {Direct search algorithms for optimization calculations},
1086 journal = {Acta Numerica},
1093 doi = {10.1017/S0962492900002841},
1094 URL = {http://journals.cambridge.org/article_S0962492900002841},
1100 journal={The Journal of Supercomputing},
1103 doi={10.1007/s11227-010-0500-5},
1104 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1105 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1106 publisher={Springer US},
1107 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1108 author={Wang, Honggang},
1114 author={Yifeng He and Lee, I. and Ling Guan},
1115 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1116 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1121 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1122 doi={10.1109/TCSVT.2009.2017411},
1126 author={Palomar, D.P. and Mung Chiang},
1127 journal={Selected Areas in Communications, IEEE Journal on},
1128 title={A tutorial on decomposition methods for network utility maximization},
1133 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1134 doi={10.1109/JSAC.2006.879350},
1139 journal={EURASIP Journal on Information Security},
1143 doi={10.1186/1687-417X-2014-1},
1144 title={Universal distortion function for steganography in an arbitrary domain},
1145 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1146 publisher={Springer International Publishing},
1147 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1151 @inproceedings{conf/wifs/HolubF12,
1152 added-at = {2013-01-23T00:00:00.000+0100},
1153 author = {Holub, Vojtech and Fridrich, Jessica J.},
1154 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1156 crossref = {conf/wifs/2012},
1157 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1158 interhash = {cbef658a6868216eef585dd759ae0668},
1159 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1160 isbn = {978-1-4673-2285-0},
1164 timestamp = {2013-01-23T00:00:00.000+0100},
1165 title = {Designing steganographic distortion using directional filters.},
1166 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1173 @article{FillerJF11,
1174 author = {Tom{\'a}s Filler and
1176 Jessica J. Fridrich},
1177 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1179 journal = {IEEE Transactions on Information Forensics and Security},
1184 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1185 bibsource = {DBLP, http://dblp.uni-trier.de}
1188 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1189 editor = {Ira S. Moskowitz},
1190 author = {Shelby Pereira and
1191 Sviatoslav Voloshynovskiy and
1193 St{\'e}phane Marchand-Maillet and
1195 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1196 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1197 title = {Second Generation Benchmarking and Application Oriented
1202 publisher = springer,
1203 address = springer_loc,
1209 @inproceedings{DBLP:conf/ih/Westfeld01,
1210 added-at = {2011-06-28T00:00:00.000+0200},
1211 author = {Westfeld, Andreas},
1212 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1213 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1214 editor = {Ira S. Moskowitz},
1216 publisher = springer,
1217 address = springer_loc,
1220 title = {F5-A Steganographic Algorithm.},
1229 @article{Chang20101286,
1230 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1231 journal = "Digital Signal Processing",
1234 pages = "1286 - 1307",
1238 doi = "10.1016/j.dsp.2009.11.005",
1239 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1240 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1241 keywords = "Security",
1242 keywords = "Wet paper coding",
1243 keywords = "Steganography",
1244 keywords = "Indicator",
1245 keywords = "Fuzzy edge detector"
1250 @article{Hu:2007:HPE:1282866.1282944,
1251 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1252 title = {A high performance edge detector based on fuzzy inference rules},
1253 journal = {Inf. Sci.},
1254 issue_date = {November, 2007},
1260 pages = {4768--4784},
1262 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1263 doi = {10.1016/j.ins.2007.04.001},
1265 publisher = {Elsevier Science Inc.},
1266 address = {New York, NY, USA},
1267 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1271 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1272 author = {Sorina Dumitrescu and
1274 editor = {Ahmet M. Eskicioglu and
1275 Jessica J. Fridrich and
1277 title = {LSB steganalysis based on high-order statistics},
1278 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1279 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1282 address = {New York, NY, USA},
1285 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1286 bibsource = {DBLP, http://dblp.uni-trier.de}
1289 @inproceedings{DBLP:conf/ih/Ker05,
1290 author = {Andrew D. Ker},
1291 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1292 editor = {Mauro Barni and
1293 Jordi Herrera-Joancomart\'{\i} and
1294 Stefan Katzenbeisser and
1295 Fernando P{\'e}rez-Gonz{\'a}lez},
1296 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1297 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1300 ee = {http://dx.doi.org/10.1007/11558859_22},
1301 publisher = springer,
1302 address = springer_loc,
1309 @inproceedings{FK12,
1310 editor = {Matthias Kirchner and
1312 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1313 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1314 author = {Jessica J. Fridrich and
1316 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1320 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1322 publisher = springer,
1323 address = springer_loc,
1325 bibsource = {DBLP, http://dblp.uni-trier.de}
1329 @article{DBLP:journals/tsp/DumitrescuWW03,
1330 added-at = {2012-02-06T00:00:00.000+0100},
1331 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1332 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1333 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1334 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1335 intrahash = {556caad9b61980d3458885153a52321c},
1336 journal = {IEEE Transactions on Signal Processing},
1339 pages = {1995-2007},
1340 timestamp = {2012-02-06T00:00:00.000+0100},
1341 title = {Detection of LSB steganography via sample pair analysis.},
1342 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1350 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1351 editor = {Nicolas D. Georganas and
1352 Radu Popescu-Zeletin},
1353 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1354 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1356 author = {Jessica J. Fridrich and
1359 title = {Reliable detection of LSB steganography in color and grayscale
1363 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1365 address = {New York, NY, USA},
1367 bibsource = {DBLP, http://dblp.uni-trier.de}
1374 @inproceedings{DBLP:conf/ih/PevnyFB10,
1375 author = {Tom{\'a}s Pevn{\'y} and
1376 Tom{\'a}s Filler and
1378 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1380 editor = {Rainer B{\"o}hme and
1381 Philip W. L. Fong and
1382 Reihaneh Safavi-Naini},
1383 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1384 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1389 publisher = springer,
1390 address = springer_loc,
1393 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1394 bibsource = {DBLP, http://dblp.uni-trier.de}
1403 author = {Tom{\'a}s Pevn{\'y} and
1404 Tom{\'a}s Filler and
1407 title = {Break Our Steganographic System},
1408 OPThowpublished = {},
1411 note = {Available at \url{http://www.agents.cz/boss/}},
1415 @proceedings{DBLP:conf/ih/2010,
1416 editor = {Rainer B{\"o}hme and
1417 Philip W. L. Fong and
1418 Reihaneh Safavi-Naini},
1419 title = {Information Hiding - 12th International Conference, IH 2010,
1420 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1422 booktitle = {Information Hiding},
1423 publisher = springer,
1424 address = springer_loc,
1428 isbn = {978-3-642-16434-7},
1429 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1430 bibsource = {DBLP, http://dblp.uni-trier.de}
1434 @article{DBLP:journals/eswa/ChenCL10,
1435 added-at = {2010-07-21T15:44:10.000+0200},
1436 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1437 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1438 date = {2010-05-03},
1439 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1440 interhash = {bc34a5f04661fee24ee62c39e76361be},
1441 intrahash = {28889a4ab329da28559f0910469f054b},
1442 journal = {Expert Systems with Applications},
1445 pages = {3292-3301},
1446 timestamp = {2010-07-21T15:44:10.000+0200},
1447 title = {High payload steganography mechanism using hybrid edge detector.},
1448 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1453 @article{DBLP:journals/tifs/FillerJF11,
1454 added-at = {2011-09-29T00:00:00.000+0200},
1455 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1456 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1457 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1458 interhash = {b27d23ed0c9936d568e16c51378abccd},
1459 intrahash = {50e43c05a74eec17524b3df8db442da5},
1460 journal = {IEEE Transactions on Information Forensics and Security},
1464 timestamp = {2011-09-29T00:00:00.000+0200},
1465 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1466 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1474 @inproceedings{DBLP:conf/ih/KimDR06,
1475 added-at = {2007-09-20T00:00:00.000+0200},
1476 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1477 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1478 booktitle = {Information Hiding},
1479 crossref = {DBLP:conf/ih/2006},
1480 date = {2007-09-20},
1481 description = {dblp},
1482 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1483 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1484 interhash = {399aab122b39cfd6f6e951a1b276c786},
1485 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1486 isbn = {978-3-540-74123-7},
1490 publisher = springer,
1491 address = springer_loc,
1493 timestamp = {2007-09-20T00:00:00.000+0200},
1494 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1495 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1501 @proceedings{DBLP:conf/ih/2006,
1502 editor = {Jan Camenisch and
1503 Christian S. Collberg and
1506 title = {Information Hiding, 8th International Workshop, IH 2006,
1507 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1508 booktitle = {Information Hiding},
1509 publisher = springer,
1510 address = springer_loc,
1514 isbn = {978-3-540-74123-7},
1515 bibsource = {DBLP, http://dblp.uni-trier.de}
1520 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1521 author = {Jessica J. Fridrich and
1522 Tom{\'a}s Pevn{\'y} and
1524 title = {Statistically undetectable jpeg steganography: dead ends
1525 challenges, and opportunities},
1527 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1528 editor = {Deepa Kundur and
1529 Balakrishnan Prabhakaran and
1531 Jessica J. Fridrich},
1532 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1533 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1535 address = {New York, NY, USA},
1538 isbn = {978-1-59593-857-2},
1539 bibsource = {DBLP, http://dblp.uni-trier.de}
1545 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1546 editor = {Nasir D. Memon and
1548 Adnan M. Alattar and
1550 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1551 Electronic Imaging Symposium, San Jose, CA, USA, January
1552 18-20, 2010, Proceedings},
1553 author = {Tom{\'a}s Filler and
1555 Jessica J. Fridrich},
1556 title = {Minimizing embedding impact in steganography using trellis-coded
1560 ee = {http://dx.doi.org/10.1117/12.838002},
1561 bibsource = {DBLP, http://dblp.uni-trier.de},
1565 series = {SPIE Proceedings},
1576 @proceedings{DBLP:conf/mediaforensics/2010,
1577 editor = {Nasir D. Memon and
1579 Adnan M. Alattar and
1581 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1582 Electronic Imaging Symposium, San Jose, CA, USA, January
1583 18-20, 2010, Proceedings},
1584 booktitle = {Media Forensics and Security},
1587 series = {SPIE Proceedings},
1590 isbn = {978-0-8194-7934-1},
1591 bibsource = {DBLP, http://dblp.uni-trier.de}
1594 @article{DBLP:journals/corr/abs-1112-5239,
1595 author = {Jacques M. Bahi and
1596 Rapha{\"e}l Couturier and
1597 Christophe Guyeux and
1598 Pierre-Cyrille H{\'e}am},
1599 title = {Efficient and Cryptographically Secure Generation of Chaotic
1600 Pseudorandom Numbers on GPU},
1602 volume = {abs/1112.5239},
1604 ee = {http://arxiv.org/abs/1112.5239},
1605 bibsource = {DBLP, http://dblp.uni-trier.de}
1609 author = {Ponomarenko, Nikolay},
1610 title = {PSNR-HVS-M page},
1611 OPThowpublished = {},
1614 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1620 author = {Bovik, Alan C.},
1621 title = {BIQI page},
1622 OPThowpublished = {},
1625 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1630 @InProceedings{PSECAL07,
1631 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1632 title = {On between-coefficient contrast masking of DCT basis functions},
1633 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1636 editor = {Li,Baoxin},
1642 OPTorganization = {},
1650 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1651 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1652 journal = {IEEE Signal Processing Letters},
1663 @inproceedings{DBLP:conf/crypto/ShubBB82,
1664 author = {Lenore Blum and
1667 title = {Comparison of Two Pseudo-Random Number Generators},
1668 editor = {David Chaum and
1669 Ronald L. Rivest and
1671 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1672 Barbara, California, USA, August 23-25, 1982},
1674 bibsource = {DBLP, http://dblp.uni-trier.de},
1675 publisher = {Plenum Press},
1676 address={New York, NY, USA},
1679 bibsource = {DBLP, http://dblp.uni-trier.de}
1683 @inproceedings{Blum:1985:EPP:19478.19501,
1684 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1685 Barbara, California, USA, August 19-22, 1984, Proceedings},
1686 author = {Manuel Blum and
1688 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1689 Which Hides All Partial Information},
1693 editor = {G. R. Blakley and
1695 publisher = springer,
1696 address = springer_loc,
1703 @article{DBLP:journals/ejisec/FontaineG07,
1704 author = {Caroline Fontaine and
1706 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1707 journal = {EURASIP Journal on Information Security},
1712 ee = {http://dx.doi.org/10.1155/2007/13801},
1713 bibsource = {DBLP, http://dblp.uni-trier.de}
1717 @article{Luo:2010:EAI:1824719.1824720,
1718 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1719 title = {Edge adaptive image steganography based on LSB matching revisited},
1720 journal = {IEEE Transactions on Information Forensics and Security},
1728 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1729 doi = {10.1109/TIFS.2010.2041812},
1731 publisher = {IEEE Press},
1732 address = {Piscataway, NJ, USA},
1733 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1736 @article{Mielikainen06,
1737 author = {Mielikainen, J.},
1738 title = {LSB Matching Revisited},
1739 journal = {IEEE Signal Processing Letters},
1754 @article{Liu:2008:FMP:1284917.1285196,
1755 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1756 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1757 journal = {Pattern Recogn.},
1758 issue_date = {January, 2008},
1766 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1767 doi = {10.1016/j.patcog.2007.06.005},
1769 publisher = {Elsevier Science Inc.},
1770 address = {New York, NY, USA},
1771 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1776 @InProceedings{LHS08,
1777 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1778 title = {Textural features based universal steganalysis},
1781 booktitle = {Proc. SPIE 6819},
1792 OPTorganization = {},
1799 @InProceedings{KF11,
1800 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1801 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1804 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1808 pages = {78800L-78800L-13},
1817 OPTorganization = {},
1823 @article{DBLP:journals/tifs/KodovskyFH12,
1824 author = {Jan Kodovsk{\'y} and
1825 Jessica J. Fridrich and
1827 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1828 journal = {IEEE Transactions on Information Forensics and Security},
1833 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1834 bibsource = {DBLP, http://dblp.uni-trier.de}
1839 @article{Fillatre:2012:ASL:2333143.2333587,
1840 author = {Fillatre, Lionel},
1841 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1842 journal = {IEEE Transactions on Signal Processing},
1850 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1851 doi = {10.1109/TSP.2011.2174231},
1853 publisher = {IEEE Press},
1854 address = {Piscataway, NJ, USA},
1858 @inproceedings{Tyan1993,
1859 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1860 address = ieecs_loc,
1862 author = {Tyan, C. Y. and Wang, P. P.},
1863 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1864 citeulike-article-id = {7936501},
1865 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1867 posted-at = {2010-10-01 17:27:48},
1870 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1876 @article{Canny:1986:CAE:11274.11275,
1877 author = {Canny, J},
1878 title = {A Computational Approach to Edge Detection},
1879 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1880 issue_date = {June 1986},
1888 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1889 doi = {10.1109/TPAMI.1986.4767851},
1891 publisher = {IEEE Computer Society},
1892 address = {Washington, DC, USA},
1893 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1897 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1898 author = {Jessica J. Fridrich and
1899 Jan Kodovsk{\'y} and
1902 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1904 booktitle = {Information Hiding},
1907 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1908 crossref = {DBLP:conf/ih/2011},
1909 bibsource = {DBLP, http://dblp.uni-trier.de}
1911 @proceedings{DBLP:conf/ih/2011,
1912 editor = {Tom{\'a}s Filler and
1913 Tom{\'a}s Pevn{\'y} and
1916 title = {Information Hiding - 13th International Conference, IH 2011,
1917 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1919 booktitle = {Information Hiding},
1920 publisher = springer,
1921 address = springer_loc,
1925 isbn = {978-3-642-24177-2},
1926 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1927 bibsource = {DBLP, http://dblp.uni-trier.de}
1930 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1931 author = {Jessica J. Fridrich},
1932 title = {Modern Trends in Steganography and Steganalysis},
1936 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1937 crossref = {DBLP:conf/iwdw/2011},
1938 bibsource = {DBLP, http://dblp.uni-trier.de}
1940 @proceedings{DBLP:conf/iwdw/2011,
1941 editor = {Yun-Qing Shi and
1942 Hyoung-Joong Kim and
1943 Fernando P{\'e}rez-Gonz{\'a}lez},
1944 title = {Digital Forensics and Watermarking - 10th International
1945 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1946 2011, Revised Selected Papers},
1948 publisher = springer,
1949 address = springer_loc,
1953 isbn = {978-3-642-32204-4},
1954 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1955 bibsource = {DBLP, http://dblp.uni-trier.de}
1961 @article{MCErlang07,
1962 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1963 title = {McErlang: a model checker for a distributed functional programming language},
1964 journal = {SIGPLAN Not.},
1973 @inproceedings{Bogor03,
1975 Matthew B. Dwyer and
1977 title = {Bogor: an extensible and highly-modular software model checking
1979 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1980 of Software Engineering 2003},
1988 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1989 title = {On Devaney's Definition of Chaos},
1990 journal = {Amer. Math. Monthly},
1996 timestamp = {27/01/2008}
1999 @article{Crook2007267,
2000 title = "Pattern recall in networks of chaotic neurons",
2001 journal = "Biosystems",
2004 pages = "267 - 274",
2007 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2008 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2010 keywords = "Spiking neural network"
2014 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2015 title = {A novel Hash algorithm construction based on chaotic neural network},
2016 journal = {Neural Computing and Applications},
2019 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2022 keyword = {Computer Science},
2023 publisher = {Springer London}
2027 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2028 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2034 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2035 doi={10.1109/TCE.2004.1309431},
2038 @article{Zhang2005759,
2039 title = "An image encryption approach based on chaotic maps",
2040 journal = "Chaos, Solitons \& Fractals",
2043 pages = "759 - 765",
2047 doi = "10.1016/j.chaos.2004.09.035",
2048 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2051 @article{Lian20091296,
2052 title = "A block cipher based on chaotic neural networks",
2053 journal = "Neurocomputing",
2056 pages = "1296 - 1301",
2059 author = "Shiguo Lian",
2060 keywords = "Neural network",
2062 keywords = "Security",
2063 keywords = "Block cipher",
2064 keywords = "Image encryption"
2068 author = {George Cybenko},
2069 title = {Approximation by Superpositions of a Sigmoidal function},
2070 journal = {Mathematics of Control, Signals and Systems},
2077 @article{DBLP:journals/nn/HornikSW89,
2078 author = {Kurt Hornik and
2079 Maxwell B. Stinchcombe and
2081 title = {Multilayer feedforward networks are universal approximators},
2082 journal = {Neural Networks},
2087 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2088 bibsource = {DBLP, http://dblp.uni-trier.de}
2091 @article{dalkiran10,
2092 author = {Ilker Dalkiran and Kenan Danisman},
2093 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2094 title = {Artificial neural network based chaotic generator for cryptology},
2102 @article{springerlink:10.1007/s00521-010-0432-2,
2103 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2104 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2105 title = {A novel Hash algorithm construction based on chaotic neural network},
2106 journal = {Neural Computing and Applications},
2107 publisher = {Springer},
2109 keyword = {Computer Science},
2115 @article{Feder2009NTB,
2116 author = {Feder, Tom\'{a}s and Subi, Carlos},
2117 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2118 journal = {Inf. Process. Lett.},
2119 issue_date = {February, 2009},
2127 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2128 doi = {10.1016/j.ipl.2008.10.015},
2130 publisher = {Elsevier North-Holland, Inc.},
2131 address = {Amsterdam, The Netherlands, The Netherlands},
2132 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2138 author={Zanten, A.~J.~van and Suparta, I.~N.},
2139 title={ Totally balanced and exponentially balanced Gray codes},
2140 journal={Discrete Analysis and Operational Research},
2148 @book{LevinPeresWilmer2006,
2149 added-at = {2010-01-19T17:51:27.000+0100},
2150 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2151 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2152 interhash = {61354795a6accb6407bfdbf04753a683},
2153 intrahash = {097dc4d1d0e412b2444f540b04110797},
2154 keywords = {markovchains probabilitytheory textbook},
2155 publisher = {American Mathematical Society},
2156 timestamp = {2010-01-19T17:51:27.000+0100},
2157 title = {{Markov chains and mixing times}},
2158 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2163 author = {M. Mitzenmacher and Eli Upfal},
2165 title = {Probability and Computing},
2166 publisher = {Cambridge University Press},
2172 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2175 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2176 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2177 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},