1 c% This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @INPROCEEDINGS{nusmv02,
5 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
6 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
7 Sebastiani and Armando Tacchella},
8 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
12 crossref = {DBLP:conf/cav/2002}
16 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
17 title = {A uniform deductive approach for parameterized protocol safety},
21 bibsource = {DBLP, http://dblp.uni-trier.de},
22 crossref = {DBLP:conf/kbse/2005},
23 ee = {http://doi.acm.org/10.1145/1101908.1101971}
26 @INPROCEEDINGS{abcvs05,
27 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
28 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
30 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
34 address = {Guelph, Canada},
36 note = {ISSN 1492-8760}
40 author = {Bahi, J. M.},
41 title = {Boolean totally asynchronous iterations},
49 author = {Bahi, J. M. and Contassot-Vivier, S.},
50 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
60 author = {Bahi, J. M. and Contassot-Vivier, S.},
61 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
70 @techreport{BCVC10:ir,
71 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
72 title = {Convergence Results of Combining Synchronism and Asynchronism for
73 Discrete-State Discrete-Time Dynamic Network},
75 institution = {LIFC - Laboratoire d’{I}nformatique de
76 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
77 type = {Research Report},
79 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
84 author = {Couchot, J.-F.},
85 title = {Formal {C}onvergence {P}roof for {D}iscrete
86 {D}ynamical {S}ystems},
88 institution = {LIFC - Laboratoire d’{I}nformatique de
89 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
90 type = {Research Report},
92 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
100 author = {Bahi, J. M. and Michel, C.},
101 title = {Convergence of discrete asynchronous iterations},
102 journal = {International Journal Computer Mathematics},
109 author = {Bahi, J. M. and Michel, C.},
110 title = {Simulations of asynchronous evolution of discrete systems},
111 journal = {Simulation Practice and Theory},
119 author = {G\'{e}rard M. Baudet},
120 title = {Asynchronous Iterative Methods for Multiprocessors},
126 doi = {http://doi.acm.org/10.1145/322063.322067},
132 title = {Parallel and distributed computation: numerical methods},
133 publisher = prenticeHall,
135 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
136 isbn = {0-13-648700-9}
140 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
141 title = {The software model checker Blast},
149 @INPROCEEDINGS{LeCun85,
151 title = {A learning scheme for threshold networks},
152 booktitle = {Cognitiva'95},
155 address = {Paris, France}
159 author = {Jeffrey L. Elman},
160 title = {Finding Structure in Time},
161 journal = {Cognitive Science},
168 author = {Andreas Frommer and Daniel B. Szyld},
169 title = {On asynchronous iterations},
175 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
181 author = {Goles Ch., E. and Salinas,L.},
182 title = {Comparison between parallel and serial dynamics of Boolean networks},
191 title = {The SPIN Model Checker: Primer and Reference Manual},
192 publisher = {Addison-Wesley, Pearson Education},
194 author = {Gerard J. Holzmann}
198 author = {Shih M.-H. and Ho, J.-L.},
199 title = {Solution of the Boolean Markus-Yamabe Problem},
200 journal = advapplMath,
208 author = {Adrien Richard},
209 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
211 journal = advapplMath,
220 author = {Adrien Richard and Jean-Paul Comet},
221 title = {Necessary conditions for multistationarity in discrete dynamical
223 journal = discreteapplMath,
226 pages = {2403--2413},
233 title = {Les syst\`emes dynamiques discrets},
234 publisher = springer,
236 author = {F. Robert},
238 series = {Math\'ematiques et Applications}
242 author = {Shih, M.-H. and Dong J.-L.},
243 title = {A combinatorial analogue of the Jacobian problem in automata networks},
244 journal = advapplMath,
253 author = {Thomas, R.},
254 title = {Boolean Formalization of Genetic Control Circuits},
262 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
263 title = {Absence of Cycles in Symmetric Neural Networks},
269 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
272 @PROCEEDINGS{DBLP:conf/cav/2002,
273 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
274 Denmark, July 27-31, 2002, Proceedings},
276 editor = {Ed Brinksma and Kim Guldstrand Larsen},
279 publisher = springer,
283 @PROCEEDINGS{DBLP:conf/kbse/2005,
284 title = {20th IEEE/ACM International Conference on Automated Software Engineering
285 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
287 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
289 bibsource = {DBLP, http://dblp.uni-trier.de},
294 author = {Ben-Ari, Mordechai},
296 title = {Principles of the Spin Model Checker},
297 isbn = {1846287693, 9781846287695}},
298 publisher = springer,
302 @INPROCEEDINGS{Wei97,
303 author = {Weise,Carsten},
304 title = {An incremental formal semantics for {PROMELA}},
305 booktitle = {SPIN97, the Third SPIN Workshop},
310 @PHDTHESIS{Couchot-PhD06,
311 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
312 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
315 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
316 TYPE = {Th\`ese de {D}octorat},
321 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
322 Page, M. and Tewfik, S. and Geiselmann, J.},
323 title = {Qualitative simulation of genetic regulatory networks
324 using piecewise-linear models},
325 journal = {Bull. Math. Biol.},
337 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
338 title = {A Fruitful Application of Formal Methods to Biological
339 Regulatory Networks: Extending {T}homas' Asynchronous
340 Logical Approach with Temporal Logic},
341 journal = {J. Theor. Biol.},
351 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
352 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
353 journal = {Biosystems},
365 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
367 title = {Genetic Network Analyzer: qualitative simulation
368 of genetic regulatory networks.},
369 journal = {Bioinformatics},
377 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
378 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
379 journal = {Genes, Genomes and Genomics},
391 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
392 title = {Analysing formal models of genetic regulatory networks with delays},
393 journal = {Int. J. Bioinformatics Res. Appl.},
399 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
400 publisher = {Inderscience Publishers},
401 address = {Inderscience Publishers, Geneva, SWITZERLAND},
404 author = {Richard, A.},
405 title = {Local negative circuits and fixed points in Boolean networks},
406 institution = {preprint arXiv number 0910.0750},
419 author = {Remy, R. and Ruet, P. and Thieffry, D.},
420 title = {Graphic requirement for multistability and attractive cycles in a
421 Boolean dynamical framework},
422 journal = {Advances in Applied Mathematics},
428 timestamp = {2009.02.05}
431 @inproceedings{DBLP:conf/icann/BahiCMMS06,
432 author = {Jacques M. Bahi and
433 Sylvain Contassot-Vivier and
437 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
438 in Heterogeneous Environments},
439 booktitle = {ICANN (2)},
442 ee = {http://dx.doi.org/10.1007/11840930_81},
443 crossref = {DBLP:conf/icann/2006-2},
444 bibsource = {DBLP, http://dblp.uni-trier.de}
447 @proceedings{DBLP:conf/icann/2006-2,
448 editor = {Stefanos D. Kollias and
449 Andreas Stafylopatis and
452 title = {Artificial Neural Networks - ICANN 2006, 16th International
453 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
455 booktitle = {ICANN (2)},
456 publisher = {Springer},
457 series = {Lecture Notes in Computer Science},
460 isbn = {3-540-38871-0},
461 bibsource = {DBLP, http://dblp.uni-trier.de}
468 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
470 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
471 publisher = {Eyrolles},
489 title = {An Introduction to Chaotic Dynamical Systems},
490 publisher = {Redwood City: Addison-Wesley},
492 author = {R. L. Devaney},
495 timestamp = {27/01/2008}
500 @article{byrd1995limited,
501 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
502 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
503 journal = {SIAM J. Sci. Comput.},
504 issue_date = {Sept. 1995},
510 pages = {1190--1208},
512 url = {http://dx.doi.org/10.1137/0916069},
513 doi = {10.1137/0916069},
515 publisher = {Society for Industrial and Applied Mathematics},
516 address = {Philadelphia, PA, USA},
517 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
520 @article{ANU:1770520,
521 author = {Powell,M. J. D.},
522 title = {Direct search algorithms for optimization calculations},
523 journal = {Acta Numerica},
530 doi = {10.1017/S0962492900002841},
531 URL = {http://journals.cambridge.org/article_S0962492900002841},
537 author={Yifeng He and Lee, I. and Ling Guan},
538 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
539 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
544 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
545 doi={10.1109/TCSVT.2009.2017411},
549 author={Palomar, D.P. and Mung Chiang},
550 journal={Selected Areas in Communications, IEEE Journal on},
551 title={A tutorial on decomposition methods for network utility maximization},
556 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
557 doi={10.1109/JSAC.2006.879350},
562 author = {Tom{\'a}s Filler and
564 Jessica J. Fridrich},
565 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
567 journal = {IEEE Transactions on Information Forensics and Security},
572 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
573 bibsource = {DBLP, http://dblp.uni-trier.de}
576 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
577 editor = {Ira S. Moskowitz},
578 author = {Shelby Pereira and
579 Sviatoslav Voloshynovskiy and
581 St{\'e}phane Marchand-Maillet and
583 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
584 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
585 title = {Second Generation Benchmarking and Application Oriented
590 publisher = springer,
591 address = springer_loc,
597 @inproceedings{DBLP:conf/ih/Westfeld01,
598 added-at = {2011-06-28T00:00:00.000+0200},
599 author = {Westfeld, Andreas},
600 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
601 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
602 editor = {Ira S. Moskowitz},
604 publisher = springer,
605 address = springer_loc,
608 title = {F5-A Steganographic Algorithm.},
617 @article{Chang20101286,
618 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
619 journal = "Digital Signal Processing",
622 pages = "1286 - 1307",
626 doi = "10.1016/j.dsp.2009.11.005",
627 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
628 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
629 keywords = "Security",
630 keywords = "Wet paper coding",
631 keywords = "Steganography",
632 keywords = "Indicator",
633 keywords = "Fuzzy edge detector"
638 @article{Hu:2007:HPE:1282866.1282944,
639 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
640 title = {A high performance edge detector based on fuzzy inference rules},
641 journal = {Inf. Sci.},
642 issue_date = {November, 2007},
648 pages = {4768--4784},
650 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
651 doi = {10.1016/j.ins.2007.04.001},
653 publisher = {Elsevier Science Inc.},
654 address = {New York, NY, USA},
655 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
659 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
660 author = {Sorina Dumitrescu and
662 editor = {Ahmet M. Eskicioglu and
663 Jessica J. Fridrich and
665 title = {LSB steganalysis based on high-order statistics},
666 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
667 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
670 address = {New York, NY, USA},
673 ee = {http://doi.acm.org/10.1145/1073170.1073176},
674 bibsource = {DBLP, http://dblp.uni-trier.de}
677 @inproceedings{DBLP:conf/ih/Ker05,
678 author = {Andrew D. Ker},
679 title = {A General Framework for Structural Steganalysis of LSB Replacement},
680 editor = {Mauro Barni and
681 Jordi Herrera-Joancomart\'{\i} and
682 Stefan Katzenbeisser and
683 Fernando P{\'e}rez-Gonz{\'a}lez},
684 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
685 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
688 ee = {http://dx.doi.org/10.1007/11558859_22},
689 publisher = springer,
690 address = springer_loc,
698 editor = {Matthias Kirchner and
700 booktitle = {Information Hiding - 14th International Conference, IH 2012,
701 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
702 author = {Jessica J. Fridrich and
704 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
708 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
710 publisher = springer,
711 address = springer_loc,
713 bibsource = {DBLP, http://dblp.uni-trier.de}
717 @article{DBLP:journals/tsp/DumitrescuWW03,
718 added-at = {2012-02-06T00:00:00.000+0100},
719 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
720 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
721 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
722 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
723 intrahash = {556caad9b61980d3458885153a52321c},
724 journal = {IEEE Transactions on Signal Processing},
728 timestamp = {2012-02-06T00:00:00.000+0100},
729 title = {Detection of LSB steganography via sample pair analysis.},
730 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
738 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
739 editor = {Nicolas D. Georganas and
740 Radu Popescu-Zeletin},
741 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
742 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
744 author = {Jessica J. Fridrich and
747 title = {Reliable detection of LSB steganography in color and grayscale
751 ee = {http://doi.acm.org/10.1145/1232454.1232466},
753 address = {New York, NY, USA},
755 bibsource = {DBLP, http://dblp.uni-trier.de}
762 @inproceedings{DBLP:conf/ih/PevnyFB10,
763 author = {Tom{\'a}s Pevn{\'y} and
766 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
768 editor = {Rainer B{\"o}hme and
769 Philip W. L. Fong and
770 Reihaneh Safavi-Naini},
771 booktitle = {Information Hiding - 12th International Conference, IH 2010,
772 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
777 publisher = springer,
778 address = springer_loc,
781 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
782 bibsource = {DBLP, http://dblp.uni-trier.de}
791 author = {Tom{\'a}s Pevn{\'y} and
795 title = {Break Our Steganographic System},
796 OPThowpublished = {},
799 note = {Available at \url{http://www.agents.cz/boss/}},
803 @proceedings{DBLP:conf/ih/2010,
804 editor = {Rainer B{\"o}hme and
805 Philip W. L. Fong and
806 Reihaneh Safavi-Naini},
807 title = {Information Hiding - 12th International Conference, IH 2010,
808 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
810 booktitle = {Information Hiding},
811 publisher = springer,
812 address = springer_loc,
816 isbn = {978-3-642-16434-7},
817 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
818 bibsource = {DBLP, http://dblp.uni-trier.de}
822 @article{DBLP:journals/eswa/ChenCL10,
823 added-at = {2010-07-21T15:44:10.000+0200},
824 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
825 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
827 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
828 interhash = {bc34a5f04661fee24ee62c39e76361be},
829 intrahash = {28889a4ab329da28559f0910469f054b},
830 journal = {Expert Systems with Applications},
834 timestamp = {2010-07-21T15:44:10.000+0200},
835 title = {High payload steganography mechanism using hybrid edge detector.},
836 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
841 @article{DBLP:journals/tifs/FillerJF11,
842 added-at = {2011-09-29T00:00:00.000+0200},
843 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
844 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
845 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
846 interhash = {b27d23ed0c9936d568e16c51378abccd},
847 intrahash = {50e43c05a74eec17524b3df8db442da5},
848 journal = {IEEE Transactions on Information Forensics and Security},
852 timestamp = {2011-09-29T00:00:00.000+0200},
853 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
854 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
862 @inproceedings{DBLP:conf/ih/KimDR06,
863 added-at = {2007-09-20T00:00:00.000+0200},
864 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
865 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
866 booktitle = {Information Hiding},
867 crossref = {DBLP:conf/ih/2006},
869 description = {dblp},
870 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
871 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
872 interhash = {399aab122b39cfd6f6e951a1b276c786},
873 intrahash = {f0324f70d62d9dfba568e393920aaa16},
874 isbn = {978-3-540-74123-7},
878 publisher = springer,
879 address = springer_loc,
881 timestamp = {2007-09-20T00:00:00.000+0200},
882 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
883 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
889 @proceedings{DBLP:conf/ih/2006,
890 editor = {Jan Camenisch and
891 Christian S. Collberg and
894 title = {Information Hiding, 8th International Workshop, IH 2006,
895 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
896 booktitle = {Information Hiding},
897 publisher = springer,
898 address = springer_loc,
902 isbn = {978-3-540-74123-7},
903 bibsource = {DBLP, http://dblp.uni-trier.de}
908 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
909 author = {Jessica J. Fridrich and
910 Tom{\'a}s Pevn{\'y} and
912 title = {Statistically undetectable jpeg steganography: dead ends
913 challenges, and opportunities},
915 ee = {http://doi.acm.org/10.1145/1288869.1288872},
916 editor = {Deepa Kundur and
917 Balakrishnan Prabhakaran and
919 Jessica J. Fridrich},
920 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
921 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
923 address = {New York, NY, USA},
926 isbn = {978-1-59593-857-2},
927 bibsource = {DBLP, http://dblp.uni-trier.de}
933 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
934 editor = {Nasir D. Memon and
938 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
939 Electronic Imaging Symposium, San Jose, CA, USA, January
940 18-20, 2010, Proceedings},
941 author = {Tom{\'a}s Filler and
943 Jessica J. Fridrich},
944 title = {Minimizing embedding impact in steganography using trellis-coded
948 ee = {http://dx.doi.org/10.1117/12.838002},
949 bibsource = {DBLP, http://dblp.uni-trier.de},
953 series = {SPIE Proceedings},
964 @proceedings{DBLP:conf/mediaforensics/2010,
965 editor = {Nasir D. Memon and
969 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
970 Electronic Imaging Symposium, San Jose, CA, USA, January
971 18-20, 2010, Proceedings},
972 booktitle = {Media Forensics and Security},
975 series = {SPIE Proceedings},
978 isbn = {978-0-8194-7934-1},
979 bibsource = {DBLP, http://dblp.uni-trier.de}
982 @article{DBLP:journals/corr/abs-1112-5239,
983 author = {Jacques M. Bahi and
984 Rapha{\"e}l Couturier and
985 Christophe Guyeux and
986 Pierre-Cyrille H{\'e}am},
987 title = {Efficient and Cryptographically Secure Generation of Chaotic
988 Pseudorandom Numbers on GPU},
990 volume = {abs/1112.5239},
992 ee = {http://arxiv.org/abs/1112.5239},
993 bibsource = {DBLP, http://dblp.uni-trier.de}
997 author = {Ponomarenko, Nikolay},
998 title = {PSNR-HVS-M page},
999 OPThowpublished = {},
1002 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1008 author = {Bovik, Alan C.},
1009 title = {BIQI page},
1010 OPThowpublished = {},
1013 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1018 @InProceedings{PSECAL07,
1019 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1020 title = {On between-coefficient contrast masking of DCT basis functions},
1021 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1024 editor = {Li,Baoxin},
1030 OPTorganization = {},
1038 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1039 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1040 journal = {IEEE Signal Processing Letters},
1051 @inproceedings{DBLP:conf/crypto/ShubBB82,
1052 author = {Lenore Blum and
1055 title = {Comparison of Two Pseudo-Random Number Generators},
1056 editor = {David Chaum and
1057 Ronald L. Rivest and
1059 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1060 Barbara, California, USA, August 23-25, 1982},
1062 bibsource = {DBLP, http://dblp.uni-trier.de},
1063 publisher = {Plenum Press},
1064 address={New York, NY, USA},
1067 bibsource = {DBLP, http://dblp.uni-trier.de}
1071 @inproceedings{Blum:1985:EPP:19478.19501,
1072 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1073 Barbara, California, USA, August 19-22, 1984, Proceedings},
1074 author = {Manuel Blum and
1076 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1077 Which Hides All Partial Information},
1081 editor = {G. R. Blakley and
1083 publisher = springer,
1084 address = springer_loc,
1091 @article{DBLP:journals/ejisec/FontaineG07,
1092 author = {Caroline Fontaine and
1094 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1095 journal = {EURASIP Journal on Information Security},
1100 ee = {http://dx.doi.org/10.1155/2007/13801},
1101 bibsource = {DBLP, http://dblp.uni-trier.de}
1105 @article{Luo:2010:EAI:1824719.1824720,
1106 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1107 title = {Edge adaptive image steganography based on LSB matching revisited},
1108 journal = {IEEE Transactions on Information Forensics and Security},
1116 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1117 doi = {10.1109/TIFS.2010.2041812},
1119 publisher = {IEEE Press},
1120 address = {Piscataway, NJ, USA},
1121 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1124 @article{Mielikainen06,
1125 author = {Mielikainen, J.},
1126 title = {LSB Matching Revisited},
1127 journal = {IEEE Signal Processing Letters},
1142 @article{Liu:2008:FMP:1284917.1285196,
1143 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1144 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1145 journal = {Pattern Recogn.},
1146 issue_date = {January, 2008},
1154 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1155 doi = {10.1016/j.patcog.2007.06.005},
1157 publisher = {Elsevier Science Inc.},
1158 address = {New York, NY, USA},
1159 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1164 @InProceedings{LHS08,
1165 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1166 title = {Textural features based universal steganalysis},
1169 booktitle = {Proc. SPIE 6819},
1180 OPTorganization = {},
1187 @InProceedings{KF11,
1188 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1189 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1192 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1196 pages = {78800L-78800L-13},
1205 OPTorganization = {},
1211 @article{DBLP:journals/tifs/KodovskyFH12,
1212 author = {Jan Kodovsk{\'y} and
1213 Jessica J. Fridrich and
1215 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1216 journal = {IEEE Transactions on Information Forensics and Security},
1221 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1222 bibsource = {DBLP, http://dblp.uni-trier.de}
1227 @article{Fillatre:2012:ASL:2333143.2333587,
1228 author = {Fillatre, Lionel},
1229 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1230 journal = {IEEE Transactions on Signal Processing},
1238 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1239 doi = {10.1109/TSP.2011.2174231},
1241 publisher = {IEEE Press},
1242 address = {Piscataway, NJ, USA},
1246 @inproceedings{Tyan1993,
1247 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1248 address = ieecs_loc,
1250 author = {Tyan, C. Y. and Wang, P. P.},
1251 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1252 citeulike-article-id = {7936501},
1253 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1255 posted-at = {2010-10-01 17:27:48},
1258 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1264 @article{Canny:1986:CAE:11274.11275,
1265 author = {Canny, J},
1266 title = {A Computational Approach to Edge Detection},
1267 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1268 issue_date = {June 1986},
1276 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1277 doi = {10.1109/TPAMI.1986.4767851},
1279 publisher = {IEEE Computer Society},
1280 address = {Washington, DC, USA},
1281 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1285 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1286 author = {Jessica J. Fridrich and
1287 Jan Kodovsk{\'y} and
1290 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1292 booktitle = {Information Hiding},
1295 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1296 crossref = {DBLP:conf/ih/2011},
1297 bibsource = {DBLP, http://dblp.uni-trier.de}
1299 @proceedings{DBLP:conf/ih/2011,
1300 editor = {Tom{\'a}s Filler and
1301 Tom{\'a}s Pevn{\'y} and
1304 title = {Information Hiding - 13th International Conference, IH 2011,
1305 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1307 booktitle = {Information Hiding},
1308 publisher = springer,
1309 address = springer_loc,
1313 isbn = {978-3-642-24177-2},
1314 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1315 bibsource = {DBLP, http://dblp.uni-trier.de}
1318 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1319 author = {Jessica J. Fridrich},
1320 title = {Modern Trends in Steganography and Steganalysis},
1324 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1325 crossref = {DBLP:conf/iwdw/2011},
1326 bibsource = {DBLP, http://dblp.uni-trier.de}
1328 @proceedings{DBLP:conf/iwdw/2011,
1329 editor = {Yun-Qing Shi and
1330 Hyoung-Joong Kim and
1331 Fernando P{\'e}rez-Gonz{\'a}lez},
1332 title = {Digital Forensics and Watermarking - 10th International
1333 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1334 2011, Revised Selected Papers},
1336 publisher = springer,
1337 address = springer_loc,
1341 isbn = {978-3-642-32204-4},
1342 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1343 bibsource = {DBLP, http://dblp.uni-trier.de}