1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
7 @inproceedings{aagc+15:ip,
8 author = {Bassam AlKindy and
11 Jean{-}Fran{\c{c}}ois Couchot and
15 title = {Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm
16 for Inferring Well Supported Phylogenetic Trees},
17 booktitle = {Computational Intelligence Methods for Bioinformatics and Biostatistics
18 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
19 10-12, 2015, Revised Selected Papers},
22 crossref = {DBLP:conf/cibb/2015},
23 url = {http://dx.doi.org/10.1007/978-3-319-44332-4_13},
24 doi = {10.1007/978-3-319-44332-4_13},
25 timestamp = {Tue, 02 Aug 2016 16:01:45 +0200},
26 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/AlKindyAGCSAP15},
27 bibsource = {dblp computer science bibliography, http://dblp.org}
30 @proceedings{DBLP:conf/cibb/2015,
31 editor = {Claudia Angelini and
32 Paola M. V. Rancoita and
34 title = {Computational Intelligence Methods for Bioinformatics and Biostatistics
35 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
36 10-12, 2015, Revised Selected Papers},
37 series = {Lecture Notes in Computer Science},
39 publisher = {Springer},
41 url = {http://dx.doi.org/10.1007/978-3-319-44332-4},
42 doi = {10.1007/978-3-319-44332-4},
43 isbn = {978-3-319-44331-7},
44 timestamp = {Tue, 02 Aug 2016 16:01:14 +0200},
45 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/2015},
46 bibsource = {dblp computer science bibliography, http://dblp.org}
52 @inproceedings{DBLP:conf/apsipa/TanL14,
53 author = {Shunquan Tan and
55 title = {Stacked convolutional auto-encoders for steganalysis of digital images},
56 booktitle = {Asia-Pacific Signal and Information Processing Association Annual
57 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
61 crossref = {DBLP:conf/apsipa/2014},
62 url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
63 doi = {10.1109/APSIPA.2014.7041565},
64 timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
65 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
66 bibsource = {dblp computer science bibliography, http://dblp.org}
68 @proceedings{DBLP:conf/apsipa/2014,
69 title = {Asia-Pacific Signal and Information Processing Association Annual
70 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
74 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
75 isbn = {978-6-1636-1823-8},
76 timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
77 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
78 bibsource = {dblp computer science bibliography, http://dblp.org}
81 @inproceeding{doi:10.1117/12.2083479,
82 author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
84 Deep learning for steganalysis via convolutional neural networks
86 journal = {Proc. SPIE},
89 pages = {94090J-94090J-10},
91 Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
94 doi = {10.1117/12.2083479},
95 URL = { http://dx.doi.org/10.1117/12.2083479},
101 @inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
102 author = {Dan Claudiu Ciresan and
105 Luca Maria Gambardella and
106 J{\"{u}}rgen Schmidhuber},
107 title = {Flexible, High Performance Convolutional Neural Networks for Image
109 booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
110 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
112 pages = {1237--1242},
114 crossref = {DBLP:conf/ijcai/2011},
115 url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
116 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
117 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
118 bibsource = {dblp computer science bibliography, http://dblp.org}
121 @proceedings{DBLP:conf/ijcai/2011,
122 editor = {Toby Walsh},
123 title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
124 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
126 publisher = {{IJCAI/AAAI}},
128 isbn = {978-1-57735-516-8},
129 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
130 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
131 bibsource = {dblp computer science bibliography, http://dblp.org}
135 @article{DBLP:journals/ftsig/DengY14,
136 author = {Li Deng and
138 title = {Deep Learning: Methods and Applications},
139 journal = {Foundations and Trends in Signal Processing},
144 url = {http://dx.doi.org/10.1561/2000000039},
145 doi = {10.1561/2000000039},
146 timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
147 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
148 bibsource = {dblp computer science bibliography, http://dblp.org}
153 journal={Multimedia Tools and Applications},
154 title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
155 publisher={Springer US},
156 author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-Fran\c{c}ois and
164 author = {Chen, Brian and Wornell, Gregory W.},
165 title = {Provably robust digital watermarking},
166 journal = {Proc. SPIE},
171 doi = {10.1117/12.371232},
172 URL = { http://dx.doi.org/10.1117/12.371232},
177 author={Darazi, R. and Hu, R. and Macq, B.},
178 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
179 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
182 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
183 doi={10.1109/ICASSP.2010.5495455},
187 @INPROCEEDINGS{WLSYNW13,
188 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
189 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
190 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
193 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
194 doi={10.1109/ICIP.2013.6738931},
201 journal={Journal of VLSI signal processing systems for signal, image and video technology},
204 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
205 publisher={Kluwer Academic Publishers},
206 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
207 author={Chen, Brian and Wornell, Gregory W.},
212 author = {Wang, C. T. and Tsai, W. H. },
213 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
216 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
225 OPTorganization = {},
231 @article{DBLP:journals/sigpro/LeeT10,
232 author = {I{-}Shi Lee and
234 title = {A new approach to covert communication via {PDF} files},
235 journal = {Signal Processing},
240 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
241 doi = {10.1016/j.sigpro.2009.07.022},
242 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
243 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
244 bibsource = {dblp computer science bibliography, http://dblp.org}
249 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
250 title = {A Copyright Protection Scheme Based on PDF},
251 journal = {International Journal of Innovative Computing, Information and Control},
258 note = {ISSN 1349-4198},
263 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
264 title = {Using Steganography to hide messages inside PDF files},
265 howpublished = {SSN Project Report},
271 @InProceedings{PD2008,
272 author = {POR, L. Y. and Delina, B.},
273 title = {Information Hiding: A New Approach in Text Steganography},
274 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
283 OPTorganization = {},
289 @article{DBLP:journals/tifs/PevnyBF10,
290 author = {Tom{\'{a}}s Pevn{\'{y}} and
292 Jessica J. Fridrich},
293 title = {Steganalysis by subtractive pixel adjacency matrix},
294 journal = {{IEEE} Transactions on Information Forensics and Security},
299 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
300 doi = {10.1109/TIFS.2010.2045842},
301 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
302 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
303 bibsource = {dblp computer science bibliography, http://dblp.org}
307 @INPROCEEDINGS{rifq/others03,
308 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
311 x-international-audience = {yes},
312 title = {{D}iscrimination power of measures of resemblance},
313 booktitle = {{IFSA}'03},
315 location = {Istanbul, Turkey}
319 @ARTICLE{Rifqi:2000:DPM:342947.342970,
320 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
323 x-international-audience = {yes},
324 title = {{D}iscrimination power of measures of comparison},
325 journal = {{F}uzzy {S}ets and {S}ystems},
333 @book{Anderberg-Cluster-1973,
334 added-at = {2008-10-29T00:31:48.000+0100},
335 author = {Anderberg, M. R.},
336 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
337 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
338 intrahash = {f586cc49441c591f06539d11d3e06006},
339 keywords = {cluster_analysis wismasys0809},
340 publisher = {Academic Press},
341 timestamp = {2008-10-29T00:31:48.000+0100},
342 title = {Cluster Analysis for Applications},
348 @article{yule1950introduction,
349 Author = {Yule, G.U. and Kendall, MG},
350 Date-Added = {2009-08-14 22:16:50 -0500},
351 Date-Modified = {2009-08-14 22:16:50 -0500},
352 Journal = {Statistics},
353 Title = {An Introduction to the Theory of},
357 @inproceedings{fgb11:ip,
359 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
362 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
363 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
364 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
366 address = {Sevilla, Spain},
367 editor = {Javier Lopez and Pierangela Samarati},
368 publisher = {SciTePress},
376 author = {Cayre, F. and Bas, P.},
377 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
378 journal = {IEEE Transactions on Information Forensics and Security},
383 doi = {10.1109/TIFS.2007.916006},
385 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
386 security, watermarking, Kerckhoffs-based embedding security classes,
387 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
388 steganography security, watermark-only-attack, watermarking, Security,
389 spread-spectrum (SS) watermarking},
391 timestamp = {2009.06.29}
393 @INPROCEEDINGS{Perez06,
394 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
395 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
397 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
409 author = {Cayre, F. and Fontaine, C. and Furon, T.},
410 title = {Watermarking security: theory and practice},
411 journal = {IEEE Transactions on Signal Processing},
414 pages = {3976--3987},
416 keywords = {blind source separation, cryptography, watermarking, Fisher information
417 matrix, blind source separation, cryptanalysis, information theory,
418 spread spectrum techniques, substitutive scheme, watermarking security,
419 Blind source separation, Fisher information matrix, equivocation,
420 security, watermarking}
425 @inproceedings{Shujun1,
426 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
427 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
428 Their Roles in Cryptography and Pseudo-Random Coding},
429 booktitle = {Cryptography and Coding, 8th IMA International Conference,
433 publisher = springer,
434 address = springer_loc,
442 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
445 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
446 title = {Random Walk in a N-cube Without Hamiltonian Cycle
447 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
449 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
457 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
460 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
461 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
462 howpublished = {in submission to the ACM Computing Surveys journal},
472 @inproceedings{couchot04:onp,
474 author = {Couchot, Jean-Fran\c{c}ois},
475 title = {V\'erification d'invariant par superposition},
476 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
477 address = {Calais, France},
478 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
479 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
480 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
481 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
490 @inproceedings{aangc+15:ip,
492 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
495 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
496 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
497 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
499 doi = {10.1007/978-3-319-16483-0_38},
500 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
503 address = {Granada, Spain},
515 @inproceedings{agcs+15:ip,
517 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
520 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
521 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
522 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
523 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
525 series = {LNCS/LNBI},
527 publisher = {Springer},
528 address = {Mexico City, Mexico},
532 note = {To appear in the LNCS/LNBI series},
538 @inproceedings{bcg11:ip,
540 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
543 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
544 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
545 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
547 address = {Luxembourg, Luxembourg},
550 note = {Best paper award},
556 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
558 classement = {ACLNI},
561 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
562 title = {Quality analysis of a chaotic proven keyed hash function},
563 journal = {International Journal On Advances in Internet Technology},
575 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
580 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
581 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
582 journal = {Annals of Telecommunications},
583 doi = {10.1007/s12243-015-0466-7},
584 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
585 publisher = {Springer},
587 note = {Available online. Paper version to appear},
591 @inproceedings{fccg15:ip,
593 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
596 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
597 title = {Steganalyzer performances in operational contexts},
598 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
600 address = {Adelaide, Australia},
608 @inproceedings{accfg15:ip,
610 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
613 author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux},
614 title = {Performance Study of Steganalysis Techniques},
615 booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on},
624 @inproceedings{bcfg12a:ip,
626 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
629 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
630 title = {Application of Steganography for Anonymity through the Internet},
631 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
633 url = {http://arxiv.org/abs/1202.5302v1},
634 address = {Venice, Italy},
643 author = {Guyeux, Christophe},
644 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
645 type = {Th\`ese de {D}octorat},
646 school = {LIFC, Universit\'e de Franche-Comt\'e},
648 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
649 month = {13 décembre},
656 @inproceedings{bcfg+13:ip,
658 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
661 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
662 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
663 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
665 doi = {10.1109/IIH-MSP.2013.141},
666 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
667 address = {Beijing, China},
673 @inproceedings{bcfg12b:ip,
675 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
678 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
679 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
680 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
682 address = {Venice, Italy},
692 @inproceedings{bcg11b:ip,
694 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
697 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
698 title = {Steganography: a Class of Algorithms having Secure Properties},
699 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
701 address = {Dalian, China},
710 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
713 impact-factor ={1.363},
714 isi-acro = {COMPUT J},
715 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
716 title = {Steganography: a class of secure and robust algorithms},
717 journal = {The Computer Journal},
721 doi = {10.1093/comjnl/bxr116},
722 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
723 publisher = {Oxford University Press},
729 @inproceedings{bcgw11:ip,
731 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
734 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
735 title = {Class of Trustworthy Pseudo Random Number Generators},
736 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
738 address = {Luxembourg, Luxembourg},
746 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
749 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
750 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
751 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
761 @inproceedings{aagp+15:ip,
763 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
765 classement = {ACTIN},
766 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
767 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
768 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
770 address = {Naples, Italy},
778 @inproceedings{acgm+14:ij,
780 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
783 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
784 title = {Finding the Core-Genes of Chloroplasts},
785 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
787 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
789 doi = {10.7763/IJBBB.2014.V4.371},
790 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
791 address = {Copenhagen, Denmark},
801 @inproceedings{akgcs+14:oip,
803 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
806 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
807 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
808 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
809 address = {Belfast, United Kingdom},
813 note = {Short paper},
818 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
821 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
822 title = {Finding the core-genes of Chloroplast Species},
823 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
833 @PhdThesis{guyeuxphd,
834 author = {Guyeux, Christophe},
835 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
836 type = {Th\`ese de {D}octorat},
837 school = {LIFC, Universit\'e de Franche-Comt\'e},
839 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
840 month = {13 décembre},
845 @inproceedings{chgw+14:oip,
847 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
849 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
850 title = {Pseudorandom Number Generators with Balanced Gray Codes},
851 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
853 address = {Vienna, Austria},
859 @inproceedings{ccfg16:ip,
860 author = {Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra Ahmed Fadil and Christophe Guyeux},
861 title = {A Second Order Derivatives based Approach for Steganography},
862 booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
873 Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.
877 @INPROCEEDINGS{nusmv02,
878 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
879 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
880 Sebastiani and Armando Tacchella},
881 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
885 crossref = {DBLP:conf/cav/2002}
889 author = {Nishanth Chandrasekaran},
890 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
895 Author = "Gastin, P. and Oddoux, D.",
896 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
897 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
898 Publisher = "Springer",
905 @inproceedings{cg04:np,
907 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
908 title = {Analyse d'atteignabilit\'e d\'eductive},
909 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
911 editor = {Julliand, Jacques},
912 address = {Besan\c{c}on, France},
921 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
922 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
923 journal = {Journal of the Brazilian Computer Society (JBCS)},
927 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
930 note = {ISSN 0104-6500},
935 @inproceedings{cddg+04:ip,
937 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
939 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
940 title = {Proving and Debugging Set-Based Specifications},
941 booktitle = {WMF'03 proceedings},
942 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
945 editor = {A. Cavalcanti and P. Machado},
946 address = {Campina Grande, Brazil},
947 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
954 @inproceedings{cdgr04:onp,
956 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
957 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
959 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
960 address = {Besan\c{c}on, France},
963 editor = {Julliand, Jacques},
964 note = {Session outils},
969 @INPROCEEDINGS{CGK05,
970 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
971 title = {A uniform deductive approach for parameterized protocol safety},
975 bibsource = {DBLP, http://dblp.uni-trier.de},
976 crossref = {DBLP:conf/kbse/2005},
977 ee = {http://doi.acm.org/10.1145/1101908.1101971}
980 @INPROCEEDINGS{abcvs05,
981 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
982 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
984 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
988 address = {Guelph, Canada},
990 note = {ISSN 1492-8760}
994 author = {Bahi, J. M.},
995 title = {Boolean totally asynchronous iterations},
1003 author = {Bahi, J. M. and Contassot-Vivier, S.},
1004 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1014 author = {Bahi, J. M. and Contassot-Vivier, S.},
1015 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
1020 pages = {1353--1363},
1025 @inproceedings{bcgr11:ip,
1027 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1029 classement = {ACTI},
1030 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
1031 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
1032 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
1036 doi = {10.1007/978-3-642-22953-4_11},
1037 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
1038 address = {Oslo, Norway},
1046 @techreport{BCVC10:ir,
1047 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
1048 title = {Convergence Results of Combining Synchronism and Asynchronism for
1049 Discrete-State Discrete-Time Dynamic Network},
1051 institution = {LIFC - Laboratoire d’{I}nformatique de
1052 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1053 type = {Research Report},
1054 number = {RR2010-02},
1055 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
1059 @techreport{Cou10:ir,
1060 author = {Couchot, J.-F.},
1061 title = {Formal {C}onvergence {P}roof for {D}iscrete
1062 {D}ynamical {S}ystems},
1063 institution = {LIFC - Laboratoire d’{I}nformatique de
1064 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1065 type = {Research Report},
1066 number = {RR2010-03},
1067 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
1075 author = {Bahi, J. M. and Michel, C.},
1076 title = {Convergence of discrete asynchronous iterations},
1077 journal = {International Journal Computer Mathematics},
1084 author = {Bahi, J. M. and Michel, C.},
1085 title = {Simulations of asynchronous evolution of discrete systems},
1086 journal = {Simulation Practice and Theory},
1094 author = {G\'{e}rard M. Baudet},
1095 title = {Asynchronous Iterative Methods for Multiprocessors},
1101 doi = {http://doi.acm.org/10.1145/322063.322067},
1107 title = {Parallel and distributed computation: numerical methods},
1108 publisher = prenticeHall,
1110 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1111 isbn = {0-13-648700-9}
1115 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
1116 title = {The software model checker Blast},
1124 @INPROCEEDINGS{LeCun85,
1125 author = {Y Le~Cun},
1126 title = {A learning scheme for threshold networks},
1127 booktitle = {Cognitiva'95},
1130 address = {Paris, France}
1134 author = {Jeffrey L. Elman},
1135 title = {Finding Structure in Time},
1136 journal = {Cognitive Science},
1143 author = {Andreas Frommer and Daniel B. Szyld},
1144 title = {On asynchronous iterations},
1150 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
1152 publisher = elsevier
1156 author = {Goles Ch., E. and Salinas,L.},
1157 title = {Comparison between parallel and serial dynamics of Boolean networks},
1166 title = {The SPIN Model Checker: Primer and Reference Manual},
1167 publisher = {Addison-Wesley, Pearson Education},
1169 author = {Gerard J. Holzmann}
1173 author = {Shih M.-H. and Ho, J.-L.},
1174 title = {Solution of the Boolean Markus-Yamabe Problem},
1175 journal = advapplMath,
1183 author = {Adrien Richard},
1184 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1186 journal = advapplMath,
1191 publisher = elsevier
1195 author = {Adrien Richard and Jean-Paul Comet},
1196 title = {Necessary conditions for multistationarity in discrete dynamical
1198 journal = discreteapplMath,
1201 pages = {2403--2413},
1204 publisher = elsevier
1208 title = {Les syst\`emes dynamiques discrets},
1209 publisher = springer,
1211 author = {F. Robert},
1213 series = {Math\'ematiques et Applications}
1217 author = {Shih, M.-H. and Dong J.-L.},
1218 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1219 journal = advapplMath,
1228 author = {Thomas, R.},
1229 title = {Boolean Formalization of Genetic Control Circuits},
1237 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1238 title = {Absence of Cycles in Symmetric Neural Networks},
1242 pages = {1235-1249},
1244 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1247 @PROCEEDINGS{DBLP:conf/cav/2002,
1248 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1249 Denmark, July 27-31, 2002, Proceedings},
1251 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1254 publisher = springer,
1258 @PROCEEDINGS{DBLP:conf/kbse/2005,
1259 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1260 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1262 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1264 bibsource = {DBLP, http://dblp.uni-trier.de},
1269 author = {Ben-Ari, Mordechai},
1271 title = {Principles of the Spin Model Checker},
1272 isbn = {1846287693, 9781846287695}},
1273 publisher = springer,
1277 @INPROCEEDINGS{Wei97,
1278 author = {Weise,Carsten},
1279 title = {An incremental formal semantics for {PROMELA}},
1280 booktitle = {SPIN97, the Third SPIN Workshop},
1285 @PHDTHESIS{Couchot-PhD06,
1286 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1287 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1290 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1291 TYPE = {Th\`ese de {D}octorat},
1296 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1297 Page, M. and Tewfik, S. and Geiselmann, J.},
1298 title = {Qualitative simulation of genetic regulatory networks
1299 using piecewise-linear models},
1300 journal = {Bull. Math. Biol.},
1312 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1313 title = {A Fruitful Application of Formal Methods to Biological
1314 Regulatory Networks: Extending {T}homas' Asynchronous
1315 Logical Approach with Temporal Logic},
1316 journal = {J. Theor. Biol.},
1326 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1327 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1328 journal = {Biosystems},
1340 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1342 title = {Genetic Network Analyzer: qualitative simulation
1343 of genetic regulatory networks.},
1344 journal = {Bioinformatics},
1352 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1353 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1354 journal = {Genes, Genomes and Genomics},
1366 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1367 title = {Analysing formal models of genetic regulatory networks with delays},
1368 journal = {Int. J. Bioinformatics Res. Appl.},
1374 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1375 publisher = {Inderscience Publishers},
1376 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1379 author = {Richard, A.},
1380 title = {Local negative circuits and fixed points in Boolean networks},
1381 institution = {preprint arXiv number 0910.0750},
1394 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1395 title = {Graphic requirement for multistability and attractive cycles in a
1396 Boolean dynamical framework},
1397 journal = {Advances in Applied Mathematics},
1403 timestamp = {2009.02.05}
1406 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1407 author = {Jacques M. Bahi and
1408 Sylvain Contassot-Vivier and
1412 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1413 in Heterogeneous Environments},
1414 booktitle = {ICANN (2)},
1417 ee = {http://dx.doi.org/10.1007/11840930_81},
1418 crossref = {DBLP:conf/icann/2006-2},
1419 bibsource = {DBLP, http://dblp.uni-trier.de}
1422 @proceedings{DBLP:conf/icann/2006-2,
1423 editor = {Stefanos D. Kollias and
1424 Andreas Stafylopatis and
1427 title = {Artificial Neural Networks - ICANN 2006, 16th International
1428 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1430 booktitle = {ICANN (2)},
1431 publisher = {Springer},
1432 series = {Lecture Notes in Computer Science},
1435 isbn = {3-540-38871-0},
1436 bibsource = {DBLP, http://dblp.uni-trier.de}
1443 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1445 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1446 publisher = {Eyrolles},
1464 title = {An Introduction to Chaotic Dynamical Systems},
1465 publisher = {Redwood City: Addison-Wesley},
1467 author = {R. L. Devaney},
1470 timestamp = {27/01/2008}
1476 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1478 classement = {ACLI},
1479 impact-factor ={1.255},
1480 isi-acro = {MECHATRONICS},
1481 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1482 title = {Active {MEMS}-based flow control using artificial neural network},
1483 journal = {Mechatronics},
1487 doi = {10.1016/j.mechatronics.2013.02.010},
1488 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1489 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1490 publisher = {Elsevier},
1493 note = {Available online. Paper version to appear},
1498 @inproceedings{cds12:ip,
1500 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1502 classement = {ACTI},
1503 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1504 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1505 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1507 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1508 address = {Besan\c{c}on, France},
1509 publisher = {IEEE CPS},
1518 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1520 classement = {ACLI},
1521 impact-factor ={2.081},
1523 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1524 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1525 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1528 pages = {013122-1 -- 013122-9},
1529 doi = {10.1063/1.3685524},
1530 url = {http://dx.doi.org/10.1063/1.3685524},
1531 publisher = {American Institute of Physics},
1539 @inproceedings{bgs11:ip,
1541 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1543 classement = {ACTI},
1544 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1545 title = {Building a Chaotic Proven Neural Network},
1546 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1547 address = {Maldives, Maldives},
1553 author = {Bahi, Jacques M. and Guyeux, Christophe},
1554 title = {Hash Functions Using Chaotic Iterations},
1555 journal = {Journal of Algorithms \& Computational Technology},
1560 classement = {ACLNI},
1561 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1563 impact-factor = {#},
1570 @PHDTHESIS{GuyeuxThese10,
1571 author = {Christophe Guyeux},
1572 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1573 en s\'{e}curit\'{e} informatique},
1574 school = {Universit\'{e} de Franche-Comt\'{e}},
1576 owner = {christophe},
1577 timestamp = {2010.12.21}
1580 @INPROCEEDINGS{gfb10:ip,
1581 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1582 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1583 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1584 Multimedia Signal Processing},
1587 address = {Darmstadt, Germany},
1589 classement = {ACTI},
1590 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1597 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1598 title = {Topological entropy},
1599 journal = {Transactions of the American Mathematical Society},
1604 timestamp = {2008.05.29}
1608 author = {Rufus Bowen},
1609 title = {Entropy for group endomorphisms and homogeneous spaces},
1610 journal = {Transactions of the American Mathematical Society},
1615 timestamp = {15/02/2008}
1618 @article{10.1109/CIMSiM.2010.36,
1619 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1620 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1621 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1625 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1626 publisher = {IEEE Computer Society},
1627 address = {Los Alamitos, CA, USA},
1629 @article{10.1109/ICME.2003.1221665,
1630 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1631 title = {Neural network based steganalysis in still images},
1632 journal ={Multimedia and Expo, IEEE International Conference on},
1636 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1637 publisher = {IEEE Computer Society},
1638 address = {Los Alamitos, CA, USA},
1641 @ARTICLE{Sullivan06steganalysisfor,
1642 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1643 title = {Steganalysis for Markov cover data with applications to images},
1644 journal = {IEEE Transactions on Information Forensics and Security},
1653 author = "Gray, Frank",
1654 title = "Pulse code communication",
1655 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1660 @INPROCEEDINGS{guyeux10ter,
1661 author = {Bahi, Jacques M. and Guyeux, Christophe},
1662 title = {A new chaos-based watermarking algorithm},
1663 booktitle = {SECRYPT'10, International Conference on Security
1667 address = {Athens, Greece},
1669 publisher = {SciTePress},
1670 classement = {ACTI},
1671 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1677 @inproceedings{Qiao:2009:SM:1704555.1704664,
1678 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1679 title = {Steganalysis of MP3Stego},
1680 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1681 series = {IJCNN'09},
1683 location = {Atlanta, Georgia, USA},
1684 pages = {2723--2728},
1686 publisher = {IEEE Press}
1689 @inproceedings{CouchotD07IFM,
1691 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1694 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1695 title = {Guiding the Correction of Parameterized Specifications},
1696 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1700 publisher = {Springer},
1701 doi = {10.1007/978-3-540-73210-5_10},
1702 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1703 address = {Oxford, UK},
1709 @inproceedings{couchot07FTP,
1713 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1714 title = {A Graph-based Strategy for the Selection of Hypotheses},
1715 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1716 address = {Liverpool, UK},
1723 @inproceedings{cgs09:ip,
1725 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1727 classement = {ACTI},
1728 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1729 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1730 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1731 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1732 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1733 publisher = {ACM Press},
1735 url = {http://arxiv.org/abs/0907.1357},
1736 otherUrl = {http://hal.inria.fr/inria-00402204},
1737 address = {Grenoble, France},
1738 editor = {Hassen Sa\"{i}di and N. Shankar},
1745 @inproceedings{couchot07cade,
1749 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1750 title = {Handling Polymorphism in Automated Deduction},
1751 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1755 publisher = {Springer},
1756 isbn = {978-3-540-73594-6},
1757 doi = {10.1007/978-3-540-73595-3_18},
1758 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1759 address = {Bremen, Germany},
1771 @inproceedings{BCDG07,
1773 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1774 equipe = {vesontio},
1775 classement = {ACTI},
1776 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1777 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1778 booktitle = {B'2007, the 7th Int. B Conference},
1782 publisher = {Springer},
1783 doi = {10.1007/11955757_10},
1784 url = {http://dx.doi.org/10.1007/11955757_10},
1785 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1786 address = {Besancon, France},
1794 @article{byrd1995limited,
1795 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1796 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1797 journal = {SIAM J. Sci. Comput.},
1798 issue_date = {Sept. 1995},
1804 pages = {1190--1208},
1806 url = {http://dx.doi.org/10.1137/0916069},
1807 doi = {10.1137/0916069},
1809 publisher = {Society for Industrial and Applied Mathematics},
1810 address = {Philadelphia, PA, USA},
1811 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1814 @article{ANU:1770520,
1815 author = {Powell,M. J. D.},
1816 title = {Direct search algorithms for optimization calculations},
1817 journal = {Acta Numerica},
1824 doi = {10.1017/S0962492900002841},
1825 URL = {http://journals.cambridge.org/article_S0962492900002841},
1831 journal={The Journal of Supercomputing},
1834 doi={10.1007/s11227-010-0500-5},
1835 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1836 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1837 publisher={Springer US},
1838 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1839 author={Wang, Honggang},
1845 author={Yifeng He and Lee, I. and Ling Guan},
1846 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1847 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1852 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1853 doi={10.1109/TCSVT.2009.2017411},
1857 author={Palomar, D.P. and Mung Chiang},
1858 journal={Selected Areas in Communications, IEEE Journal on},
1859 title={A tutorial on decomposition methods for network utility maximization},
1864 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1865 doi={10.1109/JSAC.2006.879350},
1870 journal={EURASIP Journal on Information Security},
1874 doi={10.1186/1687-417X-2014-1},
1875 title={Universal distortion function for steganography in an arbitrary domain},
1876 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1877 publisher={Springer International Publishing},
1878 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1886 @inproceedings{conf/wifs/HolubF12,
1887 added-at = {2013-01-23T00:00:00.000+0100},
1888 author = {Holub, Vojtech and Fridrich, Jessica J.},
1889 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1891 crossref = {conf/wifs/2012},
1892 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1893 interhash = {cbef658a6868216eef585dd759ae0668},
1894 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1895 isbn = {978-1-4673-2285-0},
1899 timestamp = {2013-01-23T00:00:00.000+0100},
1900 title = {Designing steganographic distortion using directional filters.},
1901 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1905 @proceedings{conf/wifs/2012,
1906 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1907 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1908 publisher = {{IEEE}},
1910 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1911 isbn = {978-1-4673-2285-0},
1912 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1913 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1914 bibsource = {dblp computer science bibliography, http://dblp.org}
1918 @article{FillerJF11,
1919 author = {Tom{\'a}s Filler and
1921 Jessica J. Fridrich},
1922 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1924 journal = {IEEE Transactions on Information Forensics and Security},
1929 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1930 bibsource = {DBLP, http://dblp.uni-trier.de}
1933 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1934 editor = {Ira S. Moskowitz},
1935 author = {Shelby Pereira and
1936 Sviatoslav Voloshynovskiy and
1938 St{\'e}phane Marchand-Maillet and
1940 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1941 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1942 title = {Second Generation Benchmarking and Application Oriented
1947 publisher = springer,
1948 address = springer_loc,
1954 @inproceedings{DBLP:conf/ih/Westfeld01,
1955 added-at = {2011-06-28T00:00:00.000+0200},
1956 author = {Westfeld, Andreas},
1957 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1958 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1959 editor = {Ira S. Moskowitz},
1961 publisher = springer,
1962 address = springer_loc,
1965 title = {F5-A Steganographic Algorithm.},
1974 @article{Chang20101286,
1975 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1976 journal = "Digital Signal Processing",
1979 pages = "1286 - 1307",
1983 doi = "10.1016/j.dsp.2009.11.005",
1984 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1985 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1986 keywords = "Security",
1987 keywords = "Wet paper coding",
1988 keywords = "Steganography",
1989 keywords = "Indicator",
1990 keywords = "Fuzzy edge detector"
1995 @article{Hu:2007:HPE:1282866.1282944,
1996 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1997 title = {A high performance edge detector based on fuzzy inference rules},
1998 journal = {Inf. Sci.},
1999 issue_date = {November, 2007},
2005 pages = {4768--4784},
2007 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
2008 doi = {10.1016/j.ins.2007.04.001},
2010 publisher = {Elsevier Science Inc.},
2011 address = {New York, NY, USA},
2012 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
2016 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
2017 author = {Sorina Dumitrescu and
2019 editor = {Ahmet M. Eskicioglu and
2020 Jessica J. Fridrich and
2022 title = {LSB steganalysis based on high-order statistics},
2023 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
2024 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
2027 address = {New York, NY, USA},
2030 ee = {http://doi.acm.org/10.1145/1073170.1073176},
2031 bibsource = {DBLP, http://dblp.uni-trier.de}
2034 @inproceedings{DBLP:conf/ih/Ker05,
2035 author = {Andrew D. Ker},
2036 title = {A General Framework for Structural Steganalysis of LSB Replacement},
2037 editor = {Mauro Barni and
2038 Jordi Herrera-Joancomart\'{\i} and
2039 Stefan Katzenbeisser and
2040 Fernando P{\'e}rez-Gonz{\'a}lez},
2041 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
2042 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
2045 ee = {http://dx.doi.org/10.1007/11558859_22},
2046 publisher = springer,
2047 address = springer_loc,
2054 @inproceedings{FK12,
2055 editor = {Matthias Kirchner and
2057 booktitle = {Information Hiding - 14th International Conference, IH 2012,
2058 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
2059 author = {Jessica J. Fridrich and
2061 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
2065 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
2067 publisher = springer,
2068 address = springer_loc,
2070 bibsource = {DBLP, http://dblp.uni-trier.de}
2074 @article{DBLP:journals/tsp/DumitrescuWW03,
2075 added-at = {2012-02-06T00:00:00.000+0100},
2076 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
2077 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
2078 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
2079 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
2080 intrahash = {556caad9b61980d3458885153a52321c},
2081 journal = {IEEE Transactions on Signal Processing},
2084 pages = {1995-2007},
2085 timestamp = {2012-02-06T00:00:00.000+0100},
2086 title = {Detection of LSB steganography via sample pair analysis.},
2087 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
2095 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
2096 editor = {Nicolas D. Georganas and
2097 Radu Popescu-Zeletin},
2098 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
2099 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
2101 author = {Jessica J. Fridrich and
2104 title = {Reliable detection of LSB steganography in color and grayscale
2108 ee = {http://doi.acm.org/10.1145/1232454.1232466},
2110 address = {New York, NY, USA},
2112 bibsource = {DBLP, http://dblp.uni-trier.de}
2119 @inproceedings{DBLP:conf/ih/PevnyFB10,
2120 author = {Tom{\'a}s Pevn{\'y} and
2121 Tom{\'a}s Filler and
2123 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
2125 editor = {Rainer B{\"o}hme and
2126 Philip W. L. Fong and
2127 Reihaneh Safavi-Naini},
2128 booktitle = {Information Hiding - 12th International Conference, IH 2010,
2129 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2134 publisher = springer,
2135 address = springer_loc,
2138 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
2139 bibsource = {DBLP, http://dblp.uni-trier.de}
2148 author = {Tom{\'a}s Pevn{\'y} and
2149 Tom{\'a}s Filler and
2152 title = {Break Our Steganographic System},
2153 OPThowpublished = {},
2156 note = {Available at \url{http://www.agents.cz/boss/}},
2160 @proceedings{DBLP:conf/ih/2010,
2161 editor = {Rainer B{\"o}hme and
2162 Philip W. L. Fong and
2163 Reihaneh Safavi-Naini},
2164 title = {Information Hiding - 12th International Conference, IH 2010,
2165 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2167 booktitle = {Information Hiding},
2168 publisher = springer,
2169 address = springer_loc,
2173 isbn = {978-3-642-16434-7},
2174 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
2175 bibsource = {DBLP, http://dblp.uni-trier.de}
2179 @article{DBLP:journals/eswa/ChenCL10,
2180 added-at = {2010-07-21T15:44:10.000+0200},
2181 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2182 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2183 date = {2010-05-03},
2184 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2185 interhash = {bc34a5f04661fee24ee62c39e76361be},
2186 intrahash = {28889a4ab329da28559f0910469f054b},
2187 journal = {Expert Systems with Applications},
2190 pages = {3292-3301},
2191 timestamp = {2010-07-21T15:44:10.000+0200},
2192 title = {High payload steganography mechanism using hybrid edge detector.},
2193 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2198 @article{DBLP:journals/tifs/FillerJF11,
2199 added-at = {2011-09-29T00:00:00.000+0200},
2200 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2201 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2202 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2203 interhash = {b27d23ed0c9936d568e16c51378abccd},
2204 intrahash = {50e43c05a74eec17524b3df8db442da5},
2205 journal = {IEEE Transactions on Information Forensics and Security},
2209 timestamp = {2011-09-29T00:00:00.000+0200},
2210 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2211 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2219 @inproceedings{DBLP:conf/ih/KimDR06,
2220 added-at = {2007-09-20T00:00:00.000+0200},
2221 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2222 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2223 booktitle = {Information Hiding},
2224 crossref = {DBLP:conf/ih/2006},
2225 date = {2007-09-20},
2226 description = {dblp},
2227 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2228 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2229 interhash = {399aab122b39cfd6f6e951a1b276c786},
2230 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2231 isbn = {978-3-540-74123-7},
2235 publisher = springer,
2236 address = springer_loc,
2238 timestamp = {2007-09-20T00:00:00.000+0200},
2239 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2240 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2246 @proceedings{DBLP:conf/ih/2006,
2247 editor = {Jan Camenisch and
2248 Christian S. Collberg and
2251 title = {Information Hiding, 8th International Workshop, IH 2006,
2252 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2253 booktitle = {Information Hiding},
2254 publisher = springer,
2255 address = springer_loc,
2259 isbn = {978-3-540-74123-7},
2260 bibsource = {DBLP, http://dblp.uni-trier.de}
2265 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2266 author = {Jessica J. Fridrich and
2267 Tom{\'a}s Pevn{\'y} and
2269 title = {Statistically undetectable jpeg steganography: dead ends
2270 challenges, and opportunities},
2272 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2273 editor = {Deepa Kundur and
2274 Balakrishnan Prabhakaran and
2276 Jessica J. Fridrich},
2277 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2278 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2280 address = {New York, NY, USA},
2283 isbn = {978-1-59593-857-2},
2284 bibsource = {DBLP, http://dblp.uni-trier.de}
2290 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2291 editor = {Nasir D. Memon and
2293 Adnan M. Alattar and
2295 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2296 Electronic Imaging Symposium, San Jose, CA, USA, January
2297 18-20, 2010, Proceedings},
2298 author = {Tom{\'a}s Filler and
2300 Jessica J. Fridrich},
2301 title = {Minimizing embedding impact in steganography using trellis-coded
2305 ee = {http://dx.doi.org/10.1117/12.838002},
2306 bibsource = {DBLP, http://dblp.uni-trier.de},
2310 series = {SPIE Proceedings},
2321 @proceedings{DBLP:conf/mediaforensics/2010,
2322 editor = {Nasir D. Memon and
2324 Adnan M. Alattar and
2326 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2327 Electronic Imaging Symposium, San Jose, CA, USA, January
2328 18-20, 2010, Proceedings},
2329 booktitle = {Media Forensics and Security},
2332 series = {SPIE Proceedings},
2335 isbn = {978-0-8194-7934-1},
2336 bibsource = {DBLP, http://dblp.uni-trier.de}
2339 @article{DBLP:journals/corr/abs-1112-5239,
2340 author = {Jacques M. Bahi and
2341 Rapha{\"e}l Couturier and
2342 Christophe Guyeux and
2343 Pierre-Cyrille H{\'e}am},
2344 title = {Efficient and Cryptographically Secure Generation of Chaotic
2345 Pseudorandom Numbers on GPU},
2347 volume = {abs/1112.5239},
2349 ee = {http://arxiv.org/abs/1112.5239},
2350 bibsource = {DBLP, http://dblp.uni-trier.de}
2354 author = {Ponomarenko, Nikolay},
2355 title = {PSNR-HVS-M page},
2356 OPThowpublished = {},
2359 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2365 author = {Bovik, Alan C.},
2366 title = {BIQI page},
2367 OPThowpublished = {},
2370 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2375 @InProceedings{PSECAL07,
2376 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2377 title = {On between-coefficient contrast masking of DCT basis functions},
2378 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2381 editor = {Li,Baoxin},
2387 OPTorganization = {},
2395 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2396 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2397 journal = {IEEE Signal Processing Letters},
2408 @inproceedings{DBLP:conf/crypto/ShubBB82,
2409 author = {Lenore Blum and
2412 title = {Comparison of Two Pseudo-Random Number Generators},
2413 editor = {David Chaum and
2414 Ronald L. Rivest and
2416 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2417 Barbara, California, USA, August 23-25, 1982},
2419 bibsource = {DBLP, http://dblp.uni-trier.de},
2420 publisher = {Plenum Press},
2421 address={New York, NY, USA},
2424 bibsource = {DBLP, http://dblp.uni-trier.de}
2428 @inproceedings{Blum:1985:EPP:19478.19501,
2429 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2430 Barbara, California, USA, August 19-22, 1984, Proceedings},
2431 author = {Manuel Blum and
2433 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2434 Which Hides All Partial Information},
2438 editor = {G. R. Blakley and
2440 publisher = springer,
2441 address = springer_loc,
2448 @article{DBLP:journals/ejisec/FontaineG07,
2449 author = {Caroline Fontaine and
2451 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2452 journal = {EURASIP Journal on Information Security},
2457 ee = {http://dx.doi.org/10.1155/2007/13801},
2458 bibsource = {DBLP, http://dblp.uni-trier.de}
2462 @article{Luo:2010:EAI:1824719.1824720,
2463 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2464 title = {Edge adaptive image steganography based on LSB matching revisited},
2465 journal = {IEEE Transactions on Information Forensics and Security},
2473 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2474 doi = {10.1109/TIFS.2010.2041812},
2476 publisher = {IEEE Press},
2477 address = {Piscataway, NJ, USA},
2478 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2481 @article{Mielikainen06,
2482 author = {Mielikainen, J.},
2483 title = {LSB Matching Revisited},
2484 journal = {IEEE Signal Processing Letters},
2499 @article{Liu:2008:FMP:1284917.1285196,
2500 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2501 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2502 journal = {Pattern Recogn.},
2503 issue_date = {January, 2008},
2511 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2512 doi = {10.1016/j.patcog.2007.06.005},
2514 publisher = {Elsevier Science Inc.},
2515 address = {New York, NY, USA},
2516 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2521 @InProceedings{LHS08,
2522 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2523 title = {Textural features based universal steganalysis},
2526 booktitle = {Proc. SPIE 6819},
2537 OPTorganization = {},
2544 @InProceedings{KF11,
2545 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2546 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2549 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2553 pages = {78800L-78800L-13},
2562 OPTorganization = {},
2568 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2569 author = {Jan Kodovský and
2571 Jessica J. Fridrich},
2572 title = {Modern steganalysis can detect YASS.},
2573 booktitle = {Media Forensics and Security},
2576 ee = {http://dx.doi.org/10.1117/12.838768}
2579 @article{DBLP:journals/tifs/KodovskyFH12,
2580 author = {Jan Kodovsk{\'y} and
2581 Jessica J. Fridrich and
2583 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2584 journal = {IEEE Transactions on Information Forensics and Security},
2589 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2590 bibsource = {DBLP, http://dblp.uni-trier.de}
2595 @article{Fillatre:2012:ASL:2333143.2333587,
2596 author = {Fillatre, Lionel},
2597 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2598 journal = {IEEE Transactions on Signal Processing},
2606 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2607 doi = {10.1109/TSP.2011.2174231},
2609 publisher = {IEEE Press},
2610 address = {Piscataway, NJ, USA},
2614 @inproceedings{Tyan1993,
2615 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2616 address = ieecs_loc,
2618 author = {Tyan, C. Y. and Wang, P. P.},
2619 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2620 citeulike-article-id = {7936501},
2621 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2623 posted-at = {2010-10-01 17:27:48},
2626 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2632 @article{Canny:1986:CAE:11274.11275,
2633 author = {Canny, J},
2634 title = {A Computational Approach to Edge Detection},
2635 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2636 issue_date = {June 1986},
2644 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2645 doi = {10.1109/TPAMI.1986.4767851},
2647 publisher = {IEEE Computer Society},
2648 address = {Washington, DC, USA},
2649 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2653 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2654 author = {Jessica J. Fridrich and
2655 Jan Kodovsk{\'y} and
2658 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2660 booktitle = {Information Hiding},
2663 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2664 crossref = {DBLP:conf/ih/2011},
2665 bibsource = {DBLP, http://dblp.uni-trier.de}
2667 @proceedings{DBLP:conf/ih/2011,
2668 editor = {Tom{\'a}s Filler and
2669 Tom{\'a}s Pevn{\'y} and
2672 title = {Information Hiding - 13th International Conference, IH 2011,
2673 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2675 booktitle = {Information Hiding},
2676 publisher = springer,
2677 address = springer_loc,
2681 isbn = {978-3-642-24177-2},
2682 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2683 bibsource = {DBLP, http://dblp.uni-trier.de}
2686 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2687 author = {Jessica J. Fridrich},
2688 title = {Modern Trends in Steganography and Steganalysis},
2692 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2693 crossref = {DBLP:conf/iwdw/2011},
2694 bibsource = {DBLP, http://dblp.uni-trier.de}
2696 @proceedings{DBLP:conf/iwdw/2011,
2697 editor = {Yun-Qing Shi and
2698 Hyoung-Joong Kim and
2699 Fernando P{\'e}rez-Gonz{\'a}lez},
2700 title = {Digital Forensics and Watermarking - 10th International
2701 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2702 2011, Revised Selected Papers},
2704 publisher = springer,
2705 address = springer_loc,
2709 isbn = {978-3-642-32204-4},
2710 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2711 bibsource = {DBLP, http://dblp.uni-trier.de}
2718 @InProceedings{kcm16:ip,
2719 author = {N. Khernane, J.-F. Couchot, A. Mostefaoui},
2720 title = {Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints},
2723 booktitle = {MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access},
2732 OPTorganization = {},
2738 @article{MCErlang07,
2739 author = {Fredlund, Lars-Ake and Svensson, Hans},
2740 title = {McErlang: a model checker for a distributed functional programming language},
2741 journal = {SIGPLAN Not.},
2750 @inproceedings{Bogor03,
2752 Matthew B. Dwyer and
2754 title = {Bogor: an extensible and highly-modular software model checking
2756 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2757 of Software Engineering 2003},
2765 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2766 title = {On Devaney's Definition of Chaos},
2767 journal = {Amer. Math. Monthly},
2773 timestamp = {27/01/2008}
2776 @article{Crook2007267,
2777 title = "Pattern recall in networks of chaotic neurons",
2778 journal = "Biosystems",
2781 pages = "267 - 274",
2784 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2785 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2787 keywords = "Spiking neural network"
2791 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2792 title = {A novel Hash algorithm construction based on chaotic neural network},
2793 journal = {Neural Computing and Applications},
2796 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2799 keyword = {Computer Science},
2800 publisher = {Springer London}
2804 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2805 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2811 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2812 doi={10.1109/TCE.2004.1309431},
2815 @article{Zhang2005759,
2816 title = "An image encryption approach based on chaotic maps",
2817 journal = "Chaos, Solitons \& Fractals",
2820 pages = "759 - 765",
2824 doi = "10.1016/j.chaos.2004.09.035",
2825 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2828 @article{Lian20091296,
2829 title = "A block cipher based on chaotic neural networks",
2830 journal = "Neurocomputing",
2833 pages = "1296 - 1301",
2836 author = "Shiguo Lian",
2837 keywords = "Neural network",
2839 keywords = "Security",
2840 keywords = "Block cipher",
2841 keywords = "Image encryption"
2845 author = {George Cybenko},
2846 title = {Approximation by Superpositions of a Sigmoidal function},
2847 journal = {Mathematics of Control, Signals and Systems},
2854 @article{DBLP:journals/nn/HornikSW89,
2855 author = {Kurt Hornik and
2856 Maxwell B. Stinchcombe and
2858 title = {Multilayer feedforward networks are universal approximators},
2859 journal = {Neural Networks},
2864 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2865 bibsource = {DBLP, http://dblp.uni-trier.de}
2868 @article{dalkiran10,
2869 author = {Ilker Dalkiran and Kenan Danisman},
2870 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2871 title = {Artificial neural network based chaotic generator for cryptology},
2879 @article{springerlink:10.1007/s00521-010-0432-2,
2880 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2881 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2882 title = {A novel Hash algorithm construction based on chaotic neural network},
2883 journal = {Neural Computing and Applications},
2884 publisher = {Springer},
2886 keyword = {Computer Science},
2892 @article{Feder2009NTB,
2893 author = {Feder, Tom\'{a}s and Subi, Carlos},
2894 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2895 journal = {Inf. Process. Lett.},
2896 issue_date = {February, 2009},
2904 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2905 doi = {10.1016/j.ipl.2008.10.015},
2907 publisher = {Elsevier North-Holland, Inc.},
2908 address = {Amsterdam, The Netherlands, The Netherlands},
2909 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2915 author={Zanten, A.~J.~van and Suparta, I.~N.},
2916 title={ Totally balanced and exponentially balanced Gray codes},
2917 journal={Discrete Analysis and Operational Research},
2925 @book{LevinPeresWilmer2006,
2926 added-at = {2010-01-19T17:51:27.000+0100},
2927 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2928 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2929 interhash = {61354795a6accb6407bfdbf04753a683},
2930 intrahash = {097dc4d1d0e412b2444f540b04110797},
2931 keywords = {markovchains probabilitytheory textbook},
2932 publisher = {American Mathematical Society},
2933 timestamp = {2010-01-19T17:51:27.000+0100},
2934 title = {{Markov chains and mixing times}},
2935 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2940 author = {M. Mitzenmacher and Eli Upfal},
2942 title = {Probability and Computing},
2943 publisher = {Cambridge University Press},
2949 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2952 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2953 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2954 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
2960 @article{Robinson:1981:CS,
2961 author = {Robinson, John P. and Cohn, Martin},
2962 title = {Counting Sequences},
2963 journal = {IEEE Trans. Comput.},
2964 issue_date = {January 1981},
2972 url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
2974 publisher = {IEEE Computer Society},
2975 address = {Washington, DC, USA},
2976 keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
2978 @article{DBLP:journals/combinatorics/BhatS96,
2979 author = {Girish S. Bhat and
2981 title = {Balanced Gray Codes},
2982 journal = {Electr. J. Comb.},
2986 url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
2987 timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
2988 biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
2989 bibsource = {dblp computer science bibliography, http://dblp.org}