1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
11 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
12 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
13 journal = {Annals of Telecommunications},
14 doi = {10.1007/s12243-015-0466-7},
15 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
16 publisher = {Springer},
18 note = {Available online. Paper version to appear},
22 @inproceedings{fccg15:ip,
24 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
27 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
28 title = {Steganalyzer performances in operational contexts},
29 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
31 address = {Adelaide, Australia},
39 @inproceedings{bcfg12a:ip,
41 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
44 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
45 title = {Application of Steganography for Anonymity through the Internet},
46 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
48 url = {http://arxiv.org/abs/1202.5302v1},
49 address = {Venice, Italy},
56 @inproceedings{bcfg+13:ip,
58 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
61 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
62 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
63 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
65 doi = {10.1109/IIH-MSP.2013.141},
66 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
67 address = {Beijing, China},
73 @inproceedings{bcfg12b:ip,
75 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
78 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
79 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
80 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
82 address = {Venice, Italy},
92 @inproceedings{bcg11b:ip,
94 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
97 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
98 title = {Steganography: a Class of Algorithms having Secure Properties},
99 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
101 address = {Dalian, China},
110 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
113 impact-factor ={1.363},
114 isi-acro = {COMPUT J},
115 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
116 title = {Steganography: a class of secure and robust algorithms},
117 journal = {The Computer Journal},
121 doi = {10.1093/comjnl/bxr116},
122 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
123 publisher = {Oxford University Press},
129 @inproceedings{bcgw11:ip,
131 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
134 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
135 title = {Class of Trustworthy Pseudo Random Number Generators},
136 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
138 address = {Luxembourg, Luxembourg},
146 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
149 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
150 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
151 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
157 @inproceedings{aagp+15:ip,
159 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
161 classement = {ACTIN},
162 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
163 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
164 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
166 address = {Naples, Italy},
174 @inproceedings{acgm+14:ij,
176 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
179 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
180 title = {Finding the Core-Genes of Chloroplasts},
181 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
183 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
185 doi = {10.7763/IJBBB.2014.V4.371},
186 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
187 address = {Copenhagen, Denmark},
197 @inproceedings{akgcs+14:oip,
199 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
202 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
203 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
204 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
205 address = {Belfast, United Kingdom},
209 note = {Short paper},
214 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
217 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
218 title = {Finding the core-genes of Chloroplast Species},
219 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
229 @PhdThesis{guyeuxphd,
230 author = {Guyeux, Christophe},
231 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
232 type = {Th\`ese de {D}octorat},
233 school = {LIFC, Universit\'e de Franche-Comt\'e},
235 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
236 month = {13 décembre},
241 @inproceedings{chgw+14:oip,
243 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
245 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
246 title = {Pseudorandom Number Generators with Balanced Gray Codes},
247 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
249 address = {Vienna, Austria},
258 @INPROCEEDINGS{nusmv02,
259 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
260 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
261 Sebastiani and Armando Tacchella},
262 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
266 crossref = {DBLP:conf/cav/2002}
270 author = {Nishanth Chandrasekaran},
271 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
276 Author = "Gastin, P. and Oddoux, D.",
277 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
278 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
279 Publisher = "Springer",
286 @inproceedings{cg04:np,
288 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
289 title = {Analyse d'atteignabilit\'e d\'eductive},
290 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
292 editor = {Julliand, Jacques},
293 address = {Besan\c{c}on, France},
302 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
303 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
304 journal = {Journal of the Brazilian Computer Society (JBCS)},
308 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
311 note = {ISSN 0104-6500},
316 @inproceedings{cddg+04:ip,
318 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
320 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
321 title = {Proving and Debugging Set-Based Specifications},
322 booktitle = {WMF'03 proceedings},
323 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
326 editor = {A. Cavalcanti and P. Machado},
327 address = {Campina Grande, Brazil},
328 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
335 @inproceedings{cdgr04:onp,
337 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
338 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
340 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
341 address = {Besan\c{c}on, France},
344 editor = {Julliand, Jacques},
345 note = {Session outils},
350 @INPROCEEDINGS{CGK05,
351 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
352 title = {A uniform deductive approach for parameterized protocol safety},
356 bibsource = {DBLP, http://dblp.uni-trier.de},
357 crossref = {DBLP:conf/kbse/2005},
358 ee = {http://doi.acm.org/10.1145/1101908.1101971}
361 @INPROCEEDINGS{abcvs05,
362 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
363 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
365 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
369 address = {Guelph, Canada},
371 note = {ISSN 1492-8760}
375 author = {Bahi, J. M.},
376 title = {Boolean totally asynchronous iterations},
384 author = {Bahi, J. M. and Contassot-Vivier, S.},
385 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
395 author = {Bahi, J. M. and Contassot-Vivier, S.},
396 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
401 pages = {1353--1363},
406 @inproceedings{bcgr11:ip,
408 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
411 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
412 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
413 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
417 doi = {10.1007/978-3-642-22953-4_11},
418 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
419 address = {Oslo, Norway},
427 @techreport{BCVC10:ir,
428 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
429 title = {Convergence Results of Combining Synchronism and Asynchronism for
430 Discrete-State Discrete-Time Dynamic Network},
432 institution = {LIFC - Laboratoire d’{I}nformatique de
433 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
434 type = {Research Report},
435 number = {RR2010-02},
436 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
440 @techreport{Cou10:ir,
441 author = {Couchot, J.-F.},
442 title = {Formal {C}onvergence {P}roof for {D}iscrete
443 {D}ynamical {S}ystems},
444 institution = {LIFC - Laboratoire d’{I}nformatique de
445 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
446 type = {Research Report},
447 number = {RR2010-03},
448 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
456 author = {Bahi, J. M. and Michel, C.},
457 title = {Convergence of discrete asynchronous iterations},
458 journal = {International Journal Computer Mathematics},
465 author = {Bahi, J. M. and Michel, C.},
466 title = {Simulations of asynchronous evolution of discrete systems},
467 journal = {Simulation Practice and Theory},
475 author = {G\'{e}rard M. Baudet},
476 title = {Asynchronous Iterative Methods for Multiprocessors},
482 doi = {http://doi.acm.org/10.1145/322063.322067},
488 title = {Parallel and distributed computation: numerical methods},
489 publisher = prenticeHall,
491 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
492 isbn = {0-13-648700-9}
496 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
497 title = {The software model checker Blast},
505 @INPROCEEDINGS{LeCun85,
507 title = {A learning scheme for threshold networks},
508 booktitle = {Cognitiva'95},
511 address = {Paris, France}
515 author = {Jeffrey L. Elman},
516 title = {Finding Structure in Time},
517 journal = {Cognitive Science},
524 author = {Andreas Frommer and Daniel B. Szyld},
525 title = {On asynchronous iterations},
531 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
537 author = {Goles Ch., E. and Salinas,L.},
538 title = {Comparison between parallel and serial dynamics of Boolean networks},
547 title = {The SPIN Model Checker: Primer and Reference Manual},
548 publisher = {Addison-Wesley, Pearson Education},
550 author = {Gerard J. Holzmann}
554 author = {Shih M.-H. and Ho, J.-L.},
555 title = {Solution of the Boolean Markus-Yamabe Problem},
556 journal = advapplMath,
564 author = {Adrien Richard},
565 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
567 journal = advapplMath,
576 author = {Adrien Richard and Jean-Paul Comet},
577 title = {Necessary conditions for multistationarity in discrete dynamical
579 journal = discreteapplMath,
582 pages = {2403--2413},
589 title = {Les syst\`emes dynamiques discrets},
590 publisher = springer,
592 author = {F. Robert},
594 series = {Math\'ematiques et Applications}
598 author = {Shih, M.-H. and Dong J.-L.},
599 title = {A combinatorial analogue of the Jacobian problem in automata networks},
600 journal = advapplMath,
609 author = {Thomas, R.},
610 title = {Boolean Formalization of Genetic Control Circuits},
618 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
619 title = {Absence of Cycles in Symmetric Neural Networks},
625 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
628 @PROCEEDINGS{DBLP:conf/cav/2002,
629 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
630 Denmark, July 27-31, 2002, Proceedings},
632 editor = {Ed Brinksma and Kim Guldstrand Larsen},
635 publisher = springer,
639 @PROCEEDINGS{DBLP:conf/kbse/2005,
640 title = {20th IEEE/ACM International Conference on Automated Software Engineering
641 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
643 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
645 bibsource = {DBLP, http://dblp.uni-trier.de},
650 author = {Ben-Ari, Mordechai},
652 title = {Principles of the Spin Model Checker},
653 isbn = {1846287693, 9781846287695}},
654 publisher = springer,
658 @INPROCEEDINGS{Wei97,
659 author = {Weise,Carsten},
660 title = {An incremental formal semantics for {PROMELA}},
661 booktitle = {SPIN97, the Third SPIN Workshop},
666 @PHDTHESIS{Couchot-PhD06,
667 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
668 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
671 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
672 TYPE = {Th\`ese de {D}octorat},
677 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
678 Page, M. and Tewfik, S. and Geiselmann, J.},
679 title = {Qualitative simulation of genetic regulatory networks
680 using piecewise-linear models},
681 journal = {Bull. Math. Biol.},
693 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
694 title = {A Fruitful Application of Formal Methods to Biological
695 Regulatory Networks: Extending {T}homas' Asynchronous
696 Logical Approach with Temporal Logic},
697 journal = {J. Theor. Biol.},
707 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
708 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
709 journal = {Biosystems},
721 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
723 title = {Genetic Network Analyzer: qualitative simulation
724 of genetic regulatory networks.},
725 journal = {Bioinformatics},
733 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
734 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
735 journal = {Genes, Genomes and Genomics},
747 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
748 title = {Analysing formal models of genetic regulatory networks with delays},
749 journal = {Int. J. Bioinformatics Res. Appl.},
755 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
756 publisher = {Inderscience Publishers},
757 address = {Inderscience Publishers, Geneva, SWITZERLAND},
760 author = {Richard, A.},
761 title = {Local negative circuits and fixed points in Boolean networks},
762 institution = {preprint arXiv number 0910.0750},
775 author = {Remy, R. and Ruet, P. and Thieffry, D.},
776 title = {Graphic requirement for multistability and attractive cycles in a
777 Boolean dynamical framework},
778 journal = {Advances in Applied Mathematics},
784 timestamp = {2009.02.05}
787 @inproceedings{DBLP:conf/icann/BahiCMMS06,
788 author = {Jacques M. Bahi and
789 Sylvain Contassot-Vivier and
793 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
794 in Heterogeneous Environments},
795 booktitle = {ICANN (2)},
798 ee = {http://dx.doi.org/10.1007/11840930_81},
799 crossref = {DBLP:conf/icann/2006-2},
800 bibsource = {DBLP, http://dblp.uni-trier.de}
803 @proceedings{DBLP:conf/icann/2006-2,
804 editor = {Stefanos D. Kollias and
805 Andreas Stafylopatis and
808 title = {Artificial Neural Networks - ICANN 2006, 16th International
809 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
811 booktitle = {ICANN (2)},
812 publisher = {Springer},
813 series = {Lecture Notes in Computer Science},
816 isbn = {3-540-38871-0},
817 bibsource = {DBLP, http://dblp.uni-trier.de}
824 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
826 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
827 publisher = {Eyrolles},
845 title = {An Introduction to Chaotic Dynamical Systems},
846 publisher = {Redwood City: Addison-Wesley},
848 author = {R. L. Devaney},
851 timestamp = {27/01/2008}
857 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
860 impact-factor ={1.255},
861 isi-acro = {MECHATRONICS},
862 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
863 title = {Active {MEMS}-based flow control using artificial neural network},
864 journal = {Mechatronics},
868 doi = {10.1016/j.mechatronics.2013.02.010},
869 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
870 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
871 publisher = {Elsevier},
874 note = {Available online. Paper version to appear},
879 @inproceedings{cds12:ip,
881 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
884 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
885 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
886 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
888 editor = {Bourgeois, Julien and de Labachelerie, Michel},
889 address = {Besan\c{c}on, France},
890 publisher = {IEEE CPS},
899 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
902 impact-factor ={2.081},
904 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
905 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
906 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
909 pages = {013122-1 -- 013122-9},
910 doi = {10.1063/1.3685524},
911 url = {http://dx.doi.org/10.1063/1.3685524},
912 publisher = {American Institute of Physics},
920 @inproceedings{bgs11:ip,
922 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
925 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
926 title = {Building a Chaotic Proven Neural Network},
927 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
928 address = {Maldives, Maldives},
934 author = {Bahi, Jacques M. and Guyeux, Christophe},
935 title = {Hash Functions Using Chaotic Iterations},
936 journal = {Journal of Algorithms \& Computational Technology},
941 classement = {ACLNI},
942 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
951 @PHDTHESIS{GuyeuxThese10,
952 author = {Christophe Guyeux},
953 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
954 en s\'{e}curit\'{e} informatique},
955 school = {Universit\'{e} de Franche-Comt\'{e}},
957 owner = {christophe},
958 timestamp = {2010.12.21}
961 @INPROCEEDINGS{gfb10:ip,
962 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
963 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
964 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
965 Multimedia Signal Processing},
968 address = {Darmstadt, Germany},
971 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
978 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
979 title = {Topological entropy},
980 journal = {Transactions of the American Mathematical Society},
985 timestamp = {2008.05.29}
989 author = {Rufus Bowen},
990 title = {Entropy for group endomorphisms and homogeneous spaces},
991 journal = {Transactions of the American Mathematical Society},
996 timestamp = {15/02/2008}
999 @article{10.1109/CIMSiM.2010.36,
1000 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1001 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1002 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1006 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1007 publisher = {IEEE Computer Society},
1008 address = {Los Alamitos, CA, USA},
1010 @article{10.1109/ICME.2003.1221665,
1011 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1012 title = {Neural network based steganalysis in still images},
1013 journal ={Multimedia and Expo, IEEE International Conference on},
1017 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1018 publisher = {IEEE Computer Society},
1019 address = {Los Alamitos, CA, USA},
1022 @ARTICLE{Sullivan06steganalysisfor,
1023 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1024 title = {Steganalysis for Markov cover data with applications to images},
1025 journal = {IEEE Transactions on Information Forensics and Security},
1034 author = "Gray, Frank",
1035 title = "Pulse code communication",
1036 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1041 @INPROCEEDINGS{guyeux10ter,
1042 author = {Bahi, Jacques M. and Guyeux, Christophe},
1043 title = {A new chaos-based watermarking algorithm},
1044 booktitle = {SECRYPT'10, International Conference on Security
1048 address = {Athens, Greece},
1050 publisher = {SciTePress},
1051 classement = {ACTI},
1052 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1058 @inproceedings{Qiao:2009:SM:1704555.1704664,
1059 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1060 title = {Steganalysis of MP3Stego},
1061 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1062 series = {IJCNN'09},
1064 location = {Atlanta, Georgia, USA},
1065 pages = {2723--2728},
1067 publisher = {IEEE Press}
1070 @inproceedings{CouchotD07IFM,
1072 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1075 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1076 title = {Guiding the Correction of Parameterized Specifications},
1077 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1081 publisher = {Springer},
1082 doi = {10.1007/978-3-540-73210-5_10},
1083 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1084 address = {Oxford, UK},
1090 @inproceedings{couchot07FTP,
1094 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1095 title = {A Graph-based Strategy for the Selection of Hypotheses},
1096 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1097 address = {Liverpool, UK},
1104 @inproceedings{cgs09:ip,
1106 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1108 classement = {ACTI},
1109 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1110 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1111 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1112 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1113 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1114 publisher = {ACM Press},
1116 url = {http://arxiv.org/abs/0907.1357},
1117 otherUrl = {http://hal.inria.fr/inria-00402204},
1118 address = {Grenoble, France},
1119 editor = {Hassen Sa\"{i}di and N. Shankar},
1126 @inproceedings{couchot07cade,
1130 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1131 title = {Handling Polymorphism in Automated Deduction},
1132 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1136 publisher = {Springer},
1137 isbn = {978-3-540-73594-6},
1138 doi = {10.1007/978-3-540-73595-3_18},
1139 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1140 address = {Bremen, Germany},
1152 @inproceedings{BCDG07,
1154 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1155 equipe = {vesontio},
1156 classement = {ACTI},
1157 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1158 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1159 booktitle = {B'2007, the 7th Int. B Conference},
1163 publisher = {Springer},
1164 doi = {10.1007/11955757_10},
1165 url = {http://dx.doi.org/10.1007/11955757_10},
1166 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1167 address = {Besancon, France},
1175 @article{byrd1995limited,
1176 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1177 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1178 journal = {SIAM J. Sci. Comput.},
1179 issue_date = {Sept. 1995},
1185 pages = {1190--1208},
1187 url = {http://dx.doi.org/10.1137/0916069},
1188 doi = {10.1137/0916069},
1190 publisher = {Society for Industrial and Applied Mathematics},
1191 address = {Philadelphia, PA, USA},
1192 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1195 @article{ANU:1770520,
1196 author = {Powell,M. J. D.},
1197 title = {Direct search algorithms for optimization calculations},
1198 journal = {Acta Numerica},
1205 doi = {10.1017/S0962492900002841},
1206 URL = {http://journals.cambridge.org/article_S0962492900002841},
1212 journal={The Journal of Supercomputing},
1215 doi={10.1007/s11227-010-0500-5},
1216 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1217 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1218 publisher={Springer US},
1219 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1220 author={Wang, Honggang},
1226 author={Yifeng He and Lee, I. and Ling Guan},
1227 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1228 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1233 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1234 doi={10.1109/TCSVT.2009.2017411},
1238 author={Palomar, D.P. and Mung Chiang},
1239 journal={Selected Areas in Communications, IEEE Journal on},
1240 title={A tutorial on decomposition methods for network utility maximization},
1245 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1246 doi={10.1109/JSAC.2006.879350},
1251 journal={EURASIP Journal on Information Security},
1255 doi={10.1186/1687-417X-2014-1},
1256 title={Universal distortion function for steganography in an arbitrary domain},
1257 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1258 publisher={Springer International Publishing},
1259 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1263 @inproceedings{conf/wifs/HolubF12,
1264 added-at = {2013-01-23T00:00:00.000+0100},
1265 author = {Holub, Vojtech and Fridrich, Jessica J.},
1266 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1268 crossref = {conf/wifs/2012},
1269 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1270 interhash = {cbef658a6868216eef585dd759ae0668},
1271 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1272 isbn = {978-1-4673-2285-0},
1276 timestamp = {2013-01-23T00:00:00.000+0100},
1277 title = {Designing steganographic distortion using directional filters.},
1278 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1285 @article{FillerJF11,
1286 author = {Tom{\'a}s Filler and
1288 Jessica J. Fridrich},
1289 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1291 journal = {IEEE Transactions on Information Forensics and Security},
1296 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1297 bibsource = {DBLP, http://dblp.uni-trier.de}
1300 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1301 editor = {Ira S. Moskowitz},
1302 author = {Shelby Pereira and
1303 Sviatoslav Voloshynovskiy and
1305 St{\'e}phane Marchand-Maillet and
1307 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1308 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1309 title = {Second Generation Benchmarking and Application Oriented
1314 publisher = springer,
1315 address = springer_loc,
1321 @inproceedings{DBLP:conf/ih/Westfeld01,
1322 added-at = {2011-06-28T00:00:00.000+0200},
1323 author = {Westfeld, Andreas},
1324 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1325 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1326 editor = {Ira S. Moskowitz},
1328 publisher = springer,
1329 address = springer_loc,
1332 title = {F5-A Steganographic Algorithm.},
1341 @article{Chang20101286,
1342 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1343 journal = "Digital Signal Processing",
1346 pages = "1286 - 1307",
1350 doi = "10.1016/j.dsp.2009.11.005",
1351 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1352 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1353 keywords = "Security",
1354 keywords = "Wet paper coding",
1355 keywords = "Steganography",
1356 keywords = "Indicator",
1357 keywords = "Fuzzy edge detector"
1362 @article{Hu:2007:HPE:1282866.1282944,
1363 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1364 title = {A high performance edge detector based on fuzzy inference rules},
1365 journal = {Inf. Sci.},
1366 issue_date = {November, 2007},
1372 pages = {4768--4784},
1374 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1375 doi = {10.1016/j.ins.2007.04.001},
1377 publisher = {Elsevier Science Inc.},
1378 address = {New York, NY, USA},
1379 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1383 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1384 author = {Sorina Dumitrescu and
1386 editor = {Ahmet M. Eskicioglu and
1387 Jessica J. Fridrich and
1389 title = {LSB steganalysis based on high-order statistics},
1390 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1391 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1394 address = {New York, NY, USA},
1397 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1398 bibsource = {DBLP, http://dblp.uni-trier.de}
1401 @inproceedings{DBLP:conf/ih/Ker05,
1402 author = {Andrew D. Ker},
1403 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1404 editor = {Mauro Barni and
1405 Jordi Herrera-Joancomart\'{\i} and
1406 Stefan Katzenbeisser and
1407 Fernando P{\'e}rez-Gonz{\'a}lez},
1408 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1409 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1412 ee = {http://dx.doi.org/10.1007/11558859_22},
1413 publisher = springer,
1414 address = springer_loc,
1421 @inproceedings{FK12,
1422 editor = {Matthias Kirchner and
1424 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1425 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1426 author = {Jessica J. Fridrich and
1428 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1432 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1434 publisher = springer,
1435 address = springer_loc,
1437 bibsource = {DBLP, http://dblp.uni-trier.de}
1441 @article{DBLP:journals/tsp/DumitrescuWW03,
1442 added-at = {2012-02-06T00:00:00.000+0100},
1443 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1444 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1445 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1446 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1447 intrahash = {556caad9b61980d3458885153a52321c},
1448 journal = {IEEE Transactions on Signal Processing},
1451 pages = {1995-2007},
1452 timestamp = {2012-02-06T00:00:00.000+0100},
1453 title = {Detection of LSB steganography via sample pair analysis.},
1454 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1462 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1463 editor = {Nicolas D. Georganas and
1464 Radu Popescu-Zeletin},
1465 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1466 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1468 author = {Jessica J. Fridrich and
1471 title = {Reliable detection of LSB steganography in color and grayscale
1475 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1477 address = {New York, NY, USA},
1479 bibsource = {DBLP, http://dblp.uni-trier.de}
1486 @inproceedings{DBLP:conf/ih/PevnyFB10,
1487 author = {Tom{\'a}s Pevn{\'y} and
1488 Tom{\'a}s Filler and
1490 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1492 editor = {Rainer B{\"o}hme and
1493 Philip W. L. Fong and
1494 Reihaneh Safavi-Naini},
1495 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1496 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1501 publisher = springer,
1502 address = springer_loc,
1505 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1506 bibsource = {DBLP, http://dblp.uni-trier.de}
1515 author = {Tom{\'a}s Pevn{\'y} and
1516 Tom{\'a}s Filler and
1519 title = {Break Our Steganographic System},
1520 OPThowpublished = {},
1523 note = {Available at \url{http://www.agents.cz/boss/}},
1527 @proceedings{DBLP:conf/ih/2010,
1528 editor = {Rainer B{\"o}hme and
1529 Philip W. L. Fong and
1530 Reihaneh Safavi-Naini},
1531 title = {Information Hiding - 12th International Conference, IH 2010,
1532 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1534 booktitle = {Information Hiding},
1535 publisher = springer,
1536 address = springer_loc,
1540 isbn = {978-3-642-16434-7},
1541 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1542 bibsource = {DBLP, http://dblp.uni-trier.de}
1546 @article{DBLP:journals/eswa/ChenCL10,
1547 added-at = {2010-07-21T15:44:10.000+0200},
1548 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1549 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1550 date = {2010-05-03},
1551 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1552 interhash = {bc34a5f04661fee24ee62c39e76361be},
1553 intrahash = {28889a4ab329da28559f0910469f054b},
1554 journal = {Expert Systems with Applications},
1557 pages = {3292-3301},
1558 timestamp = {2010-07-21T15:44:10.000+0200},
1559 title = {High payload steganography mechanism using hybrid edge detector.},
1560 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1565 @article{DBLP:journals/tifs/FillerJF11,
1566 added-at = {2011-09-29T00:00:00.000+0200},
1567 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1568 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1569 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1570 interhash = {b27d23ed0c9936d568e16c51378abccd},
1571 intrahash = {50e43c05a74eec17524b3df8db442da5},
1572 journal = {IEEE Transactions on Information Forensics and Security},
1576 timestamp = {2011-09-29T00:00:00.000+0200},
1577 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1578 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1586 @inproceedings{DBLP:conf/ih/KimDR06,
1587 added-at = {2007-09-20T00:00:00.000+0200},
1588 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1589 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1590 booktitle = {Information Hiding},
1591 crossref = {DBLP:conf/ih/2006},
1592 date = {2007-09-20},
1593 description = {dblp},
1594 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1595 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1596 interhash = {399aab122b39cfd6f6e951a1b276c786},
1597 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1598 isbn = {978-3-540-74123-7},
1602 publisher = springer,
1603 address = springer_loc,
1605 timestamp = {2007-09-20T00:00:00.000+0200},
1606 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1607 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1613 @proceedings{DBLP:conf/ih/2006,
1614 editor = {Jan Camenisch and
1615 Christian S. Collberg and
1618 title = {Information Hiding, 8th International Workshop, IH 2006,
1619 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1620 booktitle = {Information Hiding},
1621 publisher = springer,
1622 address = springer_loc,
1626 isbn = {978-3-540-74123-7},
1627 bibsource = {DBLP, http://dblp.uni-trier.de}
1632 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1633 author = {Jessica J. Fridrich and
1634 Tom{\'a}s Pevn{\'y} and
1636 title = {Statistically undetectable jpeg steganography: dead ends
1637 challenges, and opportunities},
1639 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1640 editor = {Deepa Kundur and
1641 Balakrishnan Prabhakaran and
1643 Jessica J. Fridrich},
1644 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1645 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1647 address = {New York, NY, USA},
1650 isbn = {978-1-59593-857-2},
1651 bibsource = {DBLP, http://dblp.uni-trier.de}
1657 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1658 editor = {Nasir D. Memon and
1660 Adnan M. Alattar and
1662 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1663 Electronic Imaging Symposium, San Jose, CA, USA, January
1664 18-20, 2010, Proceedings},
1665 author = {Tom{\'a}s Filler and
1667 Jessica J. Fridrich},
1668 title = {Minimizing embedding impact in steganography using trellis-coded
1672 ee = {http://dx.doi.org/10.1117/12.838002},
1673 bibsource = {DBLP, http://dblp.uni-trier.de},
1677 series = {SPIE Proceedings},
1688 @proceedings{DBLP:conf/mediaforensics/2010,
1689 editor = {Nasir D. Memon and
1691 Adnan M. Alattar and
1693 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1694 Electronic Imaging Symposium, San Jose, CA, USA, January
1695 18-20, 2010, Proceedings},
1696 booktitle = {Media Forensics and Security},
1699 series = {SPIE Proceedings},
1702 isbn = {978-0-8194-7934-1},
1703 bibsource = {DBLP, http://dblp.uni-trier.de}
1706 @article{DBLP:journals/corr/abs-1112-5239,
1707 author = {Jacques M. Bahi and
1708 Rapha{\"e}l Couturier and
1709 Christophe Guyeux and
1710 Pierre-Cyrille H{\'e}am},
1711 title = {Efficient and Cryptographically Secure Generation of Chaotic
1712 Pseudorandom Numbers on GPU},
1714 volume = {abs/1112.5239},
1716 ee = {http://arxiv.org/abs/1112.5239},
1717 bibsource = {DBLP, http://dblp.uni-trier.de}
1721 author = {Ponomarenko, Nikolay},
1722 title = {PSNR-HVS-M page},
1723 OPThowpublished = {},
1726 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1732 author = {Bovik, Alan C.},
1733 title = {BIQI page},
1734 OPThowpublished = {},
1737 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1742 @InProceedings{PSECAL07,
1743 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1744 title = {On between-coefficient contrast masking of DCT basis functions},
1745 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1748 editor = {Li,Baoxin},
1754 OPTorganization = {},
1762 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1763 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1764 journal = {IEEE Signal Processing Letters},
1775 @inproceedings{DBLP:conf/crypto/ShubBB82,
1776 author = {Lenore Blum and
1779 title = {Comparison of Two Pseudo-Random Number Generators},
1780 editor = {David Chaum and
1781 Ronald L. Rivest and
1783 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1784 Barbara, California, USA, August 23-25, 1982},
1786 bibsource = {DBLP, http://dblp.uni-trier.de},
1787 publisher = {Plenum Press},
1788 address={New York, NY, USA},
1791 bibsource = {DBLP, http://dblp.uni-trier.de}
1795 @inproceedings{Blum:1985:EPP:19478.19501,
1796 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1797 Barbara, California, USA, August 19-22, 1984, Proceedings},
1798 author = {Manuel Blum and
1800 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1801 Which Hides All Partial Information},
1805 editor = {G. R. Blakley and
1807 publisher = springer,
1808 address = springer_loc,
1815 @article{DBLP:journals/ejisec/FontaineG07,
1816 author = {Caroline Fontaine and
1818 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1819 journal = {EURASIP Journal on Information Security},
1824 ee = {http://dx.doi.org/10.1155/2007/13801},
1825 bibsource = {DBLP, http://dblp.uni-trier.de}
1829 @article{Luo:2010:EAI:1824719.1824720,
1830 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1831 title = {Edge adaptive image steganography based on LSB matching revisited},
1832 journal = {IEEE Transactions on Information Forensics and Security},
1840 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1841 doi = {10.1109/TIFS.2010.2041812},
1843 publisher = {IEEE Press},
1844 address = {Piscataway, NJ, USA},
1845 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1848 @article{Mielikainen06,
1849 author = {Mielikainen, J.},
1850 title = {LSB Matching Revisited},
1851 journal = {IEEE Signal Processing Letters},
1866 @article{Liu:2008:FMP:1284917.1285196,
1867 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1868 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1869 journal = {Pattern Recogn.},
1870 issue_date = {January, 2008},
1878 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1879 doi = {10.1016/j.patcog.2007.06.005},
1881 publisher = {Elsevier Science Inc.},
1882 address = {New York, NY, USA},
1883 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1888 @InProceedings{LHS08,
1889 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1890 title = {Textural features based universal steganalysis},
1893 booktitle = {Proc. SPIE 6819},
1904 OPTorganization = {},
1911 @InProceedings{KF11,
1912 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1913 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1916 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1920 pages = {78800L-78800L-13},
1929 OPTorganization = {},
1935 @article{DBLP:journals/tifs/KodovskyFH12,
1936 author = {Jan Kodovsk{\'y} and
1937 Jessica J. Fridrich and
1939 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1940 journal = {IEEE Transactions on Information Forensics and Security},
1945 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1946 bibsource = {DBLP, http://dblp.uni-trier.de}
1951 @article{Fillatre:2012:ASL:2333143.2333587,
1952 author = {Fillatre, Lionel},
1953 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1954 journal = {IEEE Transactions on Signal Processing},
1962 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1963 doi = {10.1109/TSP.2011.2174231},
1965 publisher = {IEEE Press},
1966 address = {Piscataway, NJ, USA},
1970 @inproceedings{Tyan1993,
1971 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1972 address = ieecs_loc,
1974 author = {Tyan, C. Y. and Wang, P. P.},
1975 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1976 citeulike-article-id = {7936501},
1977 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1979 posted-at = {2010-10-01 17:27:48},
1982 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1988 @article{Canny:1986:CAE:11274.11275,
1989 author = {Canny, J},
1990 title = {A Computational Approach to Edge Detection},
1991 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1992 issue_date = {June 1986},
2000 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2001 doi = {10.1109/TPAMI.1986.4767851},
2003 publisher = {IEEE Computer Society},
2004 address = {Washington, DC, USA},
2005 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2009 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2010 author = {Jessica J. Fridrich and
2011 Jan Kodovsk{\'y} and
2014 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2016 booktitle = {Information Hiding},
2019 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2020 crossref = {DBLP:conf/ih/2011},
2021 bibsource = {DBLP, http://dblp.uni-trier.de}
2023 @proceedings{DBLP:conf/ih/2011,
2024 editor = {Tom{\'a}s Filler and
2025 Tom{\'a}s Pevn{\'y} and
2028 title = {Information Hiding - 13th International Conference, IH 2011,
2029 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2031 booktitle = {Information Hiding},
2032 publisher = springer,
2033 address = springer_loc,
2037 isbn = {978-3-642-24177-2},
2038 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2039 bibsource = {DBLP, http://dblp.uni-trier.de}
2042 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2043 author = {Jessica J. Fridrich},
2044 title = {Modern Trends in Steganography and Steganalysis},
2048 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2049 crossref = {DBLP:conf/iwdw/2011},
2050 bibsource = {DBLP, http://dblp.uni-trier.de}
2052 @proceedings{DBLP:conf/iwdw/2011,
2053 editor = {Yun-Qing Shi and
2054 Hyoung-Joong Kim and
2055 Fernando P{\'e}rez-Gonz{\'a}lez},
2056 title = {Digital Forensics and Watermarking - 10th International
2057 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2058 2011, Revised Selected Papers},
2060 publisher = springer,
2061 address = springer_loc,
2065 isbn = {978-3-642-32204-4},
2066 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2067 bibsource = {DBLP, http://dblp.uni-trier.de}
2073 @article{MCErlang07,
2074 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2075 title = {McErlang: a model checker for a distributed functional programming language},
2076 journal = {SIGPLAN Not.},
2085 @inproceedings{Bogor03,
2087 Matthew B. Dwyer and
2089 title = {Bogor: an extensible and highly-modular software model checking
2091 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2092 of Software Engineering 2003},
2100 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2101 title = {On Devaney's Definition of Chaos},
2102 journal = {Amer. Math. Monthly},
2108 timestamp = {27/01/2008}
2111 @article{Crook2007267,
2112 title = "Pattern recall in networks of chaotic neurons",
2113 journal = "Biosystems",
2116 pages = "267 - 274",
2119 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2120 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2122 keywords = "Spiking neural network"
2126 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2127 title = {A novel Hash algorithm construction based on chaotic neural network},
2128 journal = {Neural Computing and Applications},
2131 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2134 keyword = {Computer Science},
2135 publisher = {Springer London}
2139 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2140 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2146 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2147 doi={10.1109/TCE.2004.1309431},
2150 @article{Zhang2005759,
2151 title = "An image encryption approach based on chaotic maps",
2152 journal = "Chaos, Solitons \& Fractals",
2155 pages = "759 - 765",
2159 doi = "10.1016/j.chaos.2004.09.035",
2160 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2163 @article{Lian20091296,
2164 title = "A block cipher based on chaotic neural networks",
2165 journal = "Neurocomputing",
2168 pages = "1296 - 1301",
2171 author = "Shiguo Lian",
2172 keywords = "Neural network",
2174 keywords = "Security",
2175 keywords = "Block cipher",
2176 keywords = "Image encryption"
2180 author = {George Cybenko},
2181 title = {Approximation by Superpositions of a Sigmoidal function},
2182 journal = {Mathematics of Control, Signals and Systems},
2189 @article{DBLP:journals/nn/HornikSW89,
2190 author = {Kurt Hornik and
2191 Maxwell B. Stinchcombe and
2193 title = {Multilayer feedforward networks are universal approximators},
2194 journal = {Neural Networks},
2199 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2200 bibsource = {DBLP, http://dblp.uni-trier.de}
2203 @article{dalkiran10,
2204 author = {Ilker Dalkiran and Kenan Danisman},
2205 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2206 title = {Artificial neural network based chaotic generator for cryptology},
2214 @article{springerlink:10.1007/s00521-010-0432-2,
2215 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2216 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2217 title = {A novel Hash algorithm construction based on chaotic neural network},
2218 journal = {Neural Computing and Applications},
2219 publisher = {Springer},
2221 keyword = {Computer Science},
2227 @article{Feder2009NTB,
2228 author = {Feder, Tom\'{a}s and Subi, Carlos},
2229 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2230 journal = {Inf. Process. Lett.},
2231 issue_date = {February, 2009},
2239 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2240 doi = {10.1016/j.ipl.2008.10.015},
2242 publisher = {Elsevier North-Holland, Inc.},
2243 address = {Amsterdam, The Netherlands, The Netherlands},
2244 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2250 author={Zanten, A.~J.~van and Suparta, I.~N.},
2251 title={ Totally balanced and exponentially balanced Gray codes},
2252 journal={Discrete Analysis and Operational Research},
2260 @book{LevinPeresWilmer2006,
2261 added-at = {2010-01-19T17:51:27.000+0100},
2262 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2263 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2264 interhash = {61354795a6accb6407bfdbf04753a683},
2265 intrahash = {097dc4d1d0e412b2444f540b04110797},
2266 keywords = {markovchains probabilitytheory textbook},
2267 publisher = {American Mathematical Society},
2268 timestamp = {2010-01-19T17:51:27.000+0100},
2269 title = {{Markov chains and mixing times}},
2270 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2275 author = {M. Mitzenmacher and Eli Upfal},
2277 title = {Probability and Computing},
2278 publisher = {Cambridge University Press},
2284 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2287 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2288 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2289 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},