1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
7 Michel Salomon, Jacques M Bahi},
8 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
11 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
19 address = {Belfast, UK},
26 @inproceedings{chgw+14:oip,
28 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
30 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
31 title = {Pseudorandom Number Generators with Balanced Gray Codes},
32 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
34 address = {Vienna, Austria},
43 @INPROCEEDINGS{nusmv02,
44 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
45 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
46 Sebastiani and Armando Tacchella},
47 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
51 crossref = {DBLP:conf/cav/2002}
55 author = {Nishanth Chandrasekaran},
56 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
61 Author = "Gastin, P. and Oddoux, D.",
62 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
63 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
64 Publisher = "Springer",
72 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
73 title = {A uniform deductive approach for parameterized protocol safety},
77 bibsource = {DBLP, http://dblp.uni-trier.de},
78 crossref = {DBLP:conf/kbse/2005},
79 ee = {http://doi.acm.org/10.1145/1101908.1101971}
82 @INPROCEEDINGS{abcvs05,
83 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
84 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
86 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
90 address = {Guelph, Canada},
92 note = {ISSN 1492-8760}
96 author = {Bahi, J. M.},
97 title = {Boolean totally asynchronous iterations},
105 author = {Bahi, J. M. and Contassot-Vivier, S.},
106 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
116 author = {Bahi, J. M. and Contassot-Vivier, S.},
117 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
122 pages = {1353--1363},
126 @techreport{BCVC10:ir,
127 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
128 title = {Convergence Results of Combining Synchronism and Asynchronism for
129 Discrete-State Discrete-Time Dynamic Network},
131 institution = {LIFC - Laboratoire d’{I}nformatique de
132 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
133 type = {Research Report},
134 number = {RR2010-02},
135 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
139 @techreport{Cou10:ir,
140 author = {Couchot, J.-F.},
141 title = {Formal {C}onvergence {P}roof for {D}iscrete
142 {D}ynamical {S}ystems},
144 institution = {LIFC - Laboratoire d’{I}nformatique de
145 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
146 type = {Research Report},
147 number = {RR2010-03},
148 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
156 author = {Bahi, J. M. and Michel, C.},
157 title = {Convergence of discrete asynchronous iterations},
158 journal = {International Journal Computer Mathematics},
165 author = {Bahi, J. M. and Michel, C.},
166 title = {Simulations of asynchronous evolution of discrete systems},
167 journal = {Simulation Practice and Theory},
175 author = {G\'{e}rard M. Baudet},
176 title = {Asynchronous Iterative Methods for Multiprocessors},
182 doi = {http://doi.acm.org/10.1145/322063.322067},
188 title = {Parallel and distributed computation: numerical methods},
189 publisher = prenticeHall,
191 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
192 isbn = {0-13-648700-9}
196 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
197 title = {The software model checker Blast},
205 @INPROCEEDINGS{LeCun85,
207 title = {A learning scheme for threshold networks},
208 booktitle = {Cognitiva'95},
211 address = {Paris, France}
215 author = {Jeffrey L. Elman},
216 title = {Finding Structure in Time},
217 journal = {Cognitive Science},
224 author = {Andreas Frommer and Daniel B. Szyld},
225 title = {On asynchronous iterations},
231 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
237 author = {Goles Ch., E. and Salinas,L.},
238 title = {Comparison between parallel and serial dynamics of Boolean networks},
247 title = {The SPIN Model Checker: Primer and Reference Manual},
248 publisher = {Addison-Wesley, Pearson Education},
250 author = {Gerard J. Holzmann}
254 author = {Shih M.-H. and Ho, J.-L.},
255 title = {Solution of the Boolean Markus-Yamabe Problem},
256 journal = advapplMath,
264 author = {Adrien Richard},
265 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
267 journal = advapplMath,
276 author = {Adrien Richard and Jean-Paul Comet},
277 title = {Necessary conditions for multistationarity in discrete dynamical
279 journal = discreteapplMath,
282 pages = {2403--2413},
289 title = {Les syst\`emes dynamiques discrets},
290 publisher = springer,
292 author = {F. Robert},
294 series = {Math\'ematiques et Applications}
298 author = {Shih, M.-H. and Dong J.-L.},
299 title = {A combinatorial analogue of the Jacobian problem in automata networks},
300 journal = advapplMath,
309 author = {Thomas, R.},
310 title = {Boolean Formalization of Genetic Control Circuits},
318 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
319 title = {Absence of Cycles in Symmetric Neural Networks},
325 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
328 @PROCEEDINGS{DBLP:conf/cav/2002,
329 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
330 Denmark, July 27-31, 2002, Proceedings},
332 editor = {Ed Brinksma and Kim Guldstrand Larsen},
335 publisher = springer,
339 @PROCEEDINGS{DBLP:conf/kbse/2005,
340 title = {20th IEEE/ACM International Conference on Automated Software Engineering
341 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
343 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
345 bibsource = {DBLP, http://dblp.uni-trier.de},
350 author = {Ben-Ari, Mordechai},
352 title = {Principles of the Spin Model Checker},
353 isbn = {1846287693, 9781846287695}},
354 publisher = springer,
358 @INPROCEEDINGS{Wei97,
359 author = {Weise,Carsten},
360 title = {An incremental formal semantics for {PROMELA}},
361 booktitle = {SPIN97, the Third SPIN Workshop},
366 @PHDTHESIS{Couchot-PhD06,
367 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
368 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
371 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
372 TYPE = {Th\`ese de {D}octorat},
377 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
378 Page, M. and Tewfik, S. and Geiselmann, J.},
379 title = {Qualitative simulation of genetic regulatory networks
380 using piecewise-linear models},
381 journal = {Bull. Math. Biol.},
393 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
394 title = {A Fruitful Application of Formal Methods to Biological
395 Regulatory Networks: Extending {T}homas' Asynchronous
396 Logical Approach with Temporal Logic},
397 journal = {J. Theor. Biol.},
407 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
408 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
409 journal = {Biosystems},
421 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
423 title = {Genetic Network Analyzer: qualitative simulation
424 of genetic regulatory networks.},
425 journal = {Bioinformatics},
433 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
434 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
435 journal = {Genes, Genomes and Genomics},
447 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
448 title = {Analysing formal models of genetic regulatory networks with delays},
449 journal = {Int. J. Bioinformatics Res. Appl.},
455 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
456 publisher = {Inderscience Publishers},
457 address = {Inderscience Publishers, Geneva, SWITZERLAND},
460 author = {Richard, A.},
461 title = {Local negative circuits and fixed points in Boolean networks},
462 institution = {preprint arXiv number 0910.0750},
475 author = {Remy, R. and Ruet, P. and Thieffry, D.},
476 title = {Graphic requirement for multistability and attractive cycles in a
477 Boolean dynamical framework},
478 journal = {Advances in Applied Mathematics},
484 timestamp = {2009.02.05}
487 @inproceedings{DBLP:conf/icann/BahiCMMS06,
488 author = {Jacques M. Bahi and
489 Sylvain Contassot-Vivier and
493 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
494 in Heterogeneous Environments},
495 booktitle = {ICANN (2)},
498 ee = {http://dx.doi.org/10.1007/11840930_81},
499 crossref = {DBLP:conf/icann/2006-2},
500 bibsource = {DBLP, http://dblp.uni-trier.de}
503 @proceedings{DBLP:conf/icann/2006-2,
504 editor = {Stefanos D. Kollias and
505 Andreas Stafylopatis and
508 title = {Artificial Neural Networks - ICANN 2006, 16th International
509 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
511 booktitle = {ICANN (2)},
512 publisher = {Springer},
513 series = {Lecture Notes in Computer Science},
516 isbn = {3-540-38871-0},
517 bibsource = {DBLP, http://dblp.uni-trier.de}
524 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
526 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
527 publisher = {Eyrolles},
545 title = {An Introduction to Chaotic Dynamical Systems},
546 publisher = {Redwood City: Addison-Wesley},
548 author = {R. L. Devaney},
551 timestamp = {27/01/2008}
557 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
560 impact-factor ={2.081},
562 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
563 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
564 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
567 pages = {013122-1 -- 013122-9},
568 doi = {10.1063/1.3685524},
569 url = {http://dx.doi.org/10.1063/1.3685524},
570 publisher = {American Institute of Physics},
578 @inproceedings{bgs11:ip,
580 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
583 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
584 title = {Building a Chaotic Proven Neural Network},
585 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
586 address = {Maldives, Maldives},
592 author = {Bahi, Jacques M. and Guyeux, Christophe},
593 title = {Hash Functions Using Chaotic Iterations},
594 journal = {Journal of Algorithms \& Computational Technology},
599 classement = {ACLNI},
600 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
609 @PHDTHESIS{GuyeuxThese10,
610 author = {Christophe Guyeux},
611 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
612 en s\'{e}curit\'{e} informatique},
613 school = {Universit\'{e} de Franche-Comt\'{e}},
615 owner = {christophe},
616 timestamp = {2010.12.21}
619 @INPROCEEDINGS{gfb10:ip,
620 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
621 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
622 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
623 Multimedia Signal Processing},
626 address = {Darmstadt, Germany},
629 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
636 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
637 title = {Topological entropy},
638 journal = {Transactions of the American Mathematical Society},
643 timestamp = {2008.05.29}
647 author = {Rufus Bowen},
648 title = {Entropy for group endomorphisms and homogeneous spaces},
649 journal = {Transactions of the American Mathematical Society},
654 timestamp = {15/02/2008}
657 @article{10.1109/CIMSiM.2010.36,
658 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
659 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
660 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
664 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
665 publisher = {IEEE Computer Society},
666 address = {Los Alamitos, CA, USA},
668 @article{10.1109/ICME.2003.1221665,
669 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
670 title = {Neural network based steganalysis in still images},
671 journal ={Multimedia and Expo, IEEE International Conference on},
675 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
676 publisher = {IEEE Computer Society},
677 address = {Los Alamitos, CA, USA},
680 @ARTICLE{Sullivan06steganalysisfor,
681 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
682 title = {Steganalysis for Markov cover data with applications to images},
683 journal = {IEEE Transactions on Information Forensics and Security},
692 author = "Gray, Frank",
693 title = "Pulse code communication",
694 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
699 @INPROCEEDINGS{guyeux10ter,
700 author = {Bahi, Jacques M. and Guyeux, Christophe},
701 title = {A new chaos-based watermarking algorithm},
702 booktitle = {SECRYPT'10, International Conference on Security
706 address = {Athens, Greece},
708 publisher = {SciTePress},
710 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
716 @inproceedings{Qiao:2009:SM:1704555.1704664,
717 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
718 title = {Steganalysis of MP3Stego},
719 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
722 location = {Atlanta, Georgia, USA},
723 pages = {2723--2728},
725 publisher = {IEEE Press}
730 @article{byrd1995limited,
731 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
732 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
733 journal = {SIAM J. Sci. Comput.},
734 issue_date = {Sept. 1995},
740 pages = {1190--1208},
742 url = {http://dx.doi.org/10.1137/0916069},
743 doi = {10.1137/0916069},
745 publisher = {Society for Industrial and Applied Mathematics},
746 address = {Philadelphia, PA, USA},
747 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
750 @article{ANU:1770520,
751 author = {Powell,M. J. D.},
752 title = {Direct search algorithms for optimization calculations},
753 journal = {Acta Numerica},
760 doi = {10.1017/S0962492900002841},
761 URL = {http://journals.cambridge.org/article_S0962492900002841},
767 journal={The Journal of Supercomputing},
770 doi={10.1007/s11227-010-0500-5},
771 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
772 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
773 publisher={Springer US},
774 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
775 author={Wang, Honggang},
781 author={Yifeng He and Lee, I. and Ling Guan},
782 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
783 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
788 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
789 doi={10.1109/TCSVT.2009.2017411},
793 author={Palomar, D.P. and Mung Chiang},
794 journal={Selected Areas in Communications, IEEE Journal on},
795 title={A tutorial on decomposition methods for network utility maximization},
800 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
801 doi={10.1109/JSAC.2006.879350},
806 journal={EURASIP Journal on Information Security},
810 doi={10.1186/1687-417X-2014-1},
811 title={Universal distortion function for steganography in an arbitrary domain},
812 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
813 publisher={Springer International Publishing},
814 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
818 @inproceedings{conf/wifs/HolubF12,
819 added-at = {2013-01-23T00:00:00.000+0100},
820 author = {Holub, Vojtech and Fridrich, Jessica J.},
821 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
823 crossref = {conf/wifs/2012},
824 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
825 interhash = {cbef658a6868216eef585dd759ae0668},
826 intrahash = {a685b4b8b521ac99734fb52c064ca994},
827 isbn = {978-1-4673-2285-0},
831 timestamp = {2013-01-23T00:00:00.000+0100},
832 title = {Designing steganographic distortion using directional filters.},
833 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
841 author = {Tom{\'a}s Filler and
843 Jessica J. Fridrich},
844 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
846 journal = {IEEE Transactions on Information Forensics and Security},
851 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
852 bibsource = {DBLP, http://dblp.uni-trier.de}
855 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
856 editor = {Ira S. Moskowitz},
857 author = {Shelby Pereira and
858 Sviatoslav Voloshynovskiy and
860 St{\'e}phane Marchand-Maillet and
862 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
863 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
864 title = {Second Generation Benchmarking and Application Oriented
869 publisher = springer,
870 address = springer_loc,
876 @inproceedings{DBLP:conf/ih/Westfeld01,
877 added-at = {2011-06-28T00:00:00.000+0200},
878 author = {Westfeld, Andreas},
879 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
880 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
881 editor = {Ira S. Moskowitz},
883 publisher = springer,
884 address = springer_loc,
887 title = {F5-A Steganographic Algorithm.},
896 @article{Chang20101286,
897 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
898 journal = "Digital Signal Processing",
901 pages = "1286 - 1307",
905 doi = "10.1016/j.dsp.2009.11.005",
906 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
907 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
908 keywords = "Security",
909 keywords = "Wet paper coding",
910 keywords = "Steganography",
911 keywords = "Indicator",
912 keywords = "Fuzzy edge detector"
917 @article{Hu:2007:HPE:1282866.1282944,
918 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
919 title = {A high performance edge detector based on fuzzy inference rules},
920 journal = {Inf. Sci.},
921 issue_date = {November, 2007},
927 pages = {4768--4784},
929 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
930 doi = {10.1016/j.ins.2007.04.001},
932 publisher = {Elsevier Science Inc.},
933 address = {New York, NY, USA},
934 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
938 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
939 author = {Sorina Dumitrescu and
941 editor = {Ahmet M. Eskicioglu and
942 Jessica J. Fridrich and
944 title = {LSB steganalysis based on high-order statistics},
945 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
946 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
949 address = {New York, NY, USA},
952 ee = {http://doi.acm.org/10.1145/1073170.1073176},
953 bibsource = {DBLP, http://dblp.uni-trier.de}
956 @inproceedings{DBLP:conf/ih/Ker05,
957 author = {Andrew D. Ker},
958 title = {A General Framework for Structural Steganalysis of LSB Replacement},
959 editor = {Mauro Barni and
960 Jordi Herrera-Joancomart\'{\i} and
961 Stefan Katzenbeisser and
962 Fernando P{\'e}rez-Gonz{\'a}lez},
963 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
964 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
967 ee = {http://dx.doi.org/10.1007/11558859_22},
968 publisher = springer,
969 address = springer_loc,
977 editor = {Matthias Kirchner and
979 booktitle = {Information Hiding - 14th International Conference, IH 2012,
980 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
981 author = {Jessica J. Fridrich and
983 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
987 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
989 publisher = springer,
990 address = springer_loc,
992 bibsource = {DBLP, http://dblp.uni-trier.de}
996 @article{DBLP:journals/tsp/DumitrescuWW03,
997 added-at = {2012-02-06T00:00:00.000+0100},
998 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
999 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1000 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1001 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1002 intrahash = {556caad9b61980d3458885153a52321c},
1003 journal = {IEEE Transactions on Signal Processing},
1006 pages = {1995-2007},
1007 timestamp = {2012-02-06T00:00:00.000+0100},
1008 title = {Detection of LSB steganography via sample pair analysis.},
1009 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1017 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1018 editor = {Nicolas D. Georganas and
1019 Radu Popescu-Zeletin},
1020 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1021 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1023 author = {Jessica J. Fridrich and
1026 title = {Reliable detection of LSB steganography in color and grayscale
1030 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1032 address = {New York, NY, USA},
1034 bibsource = {DBLP, http://dblp.uni-trier.de}
1041 @inproceedings{DBLP:conf/ih/PevnyFB10,
1042 author = {Tom{\'a}s Pevn{\'y} and
1043 Tom{\'a}s Filler and
1045 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1047 editor = {Rainer B{\"o}hme and
1048 Philip W. L. Fong and
1049 Reihaneh Safavi-Naini},
1050 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1051 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1056 publisher = springer,
1057 address = springer_loc,
1060 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1061 bibsource = {DBLP, http://dblp.uni-trier.de}
1070 author = {Tom{\'a}s Pevn{\'y} and
1071 Tom{\'a}s Filler and
1074 title = {Break Our Steganographic System},
1075 OPThowpublished = {},
1078 note = {Available at \url{http://www.agents.cz/boss/}},
1082 @proceedings{DBLP:conf/ih/2010,
1083 editor = {Rainer B{\"o}hme and
1084 Philip W. L. Fong and
1085 Reihaneh Safavi-Naini},
1086 title = {Information Hiding - 12th International Conference, IH 2010,
1087 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1089 booktitle = {Information Hiding},
1090 publisher = springer,
1091 address = springer_loc,
1095 isbn = {978-3-642-16434-7},
1096 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1097 bibsource = {DBLP, http://dblp.uni-trier.de}
1101 @article{DBLP:journals/eswa/ChenCL10,
1102 added-at = {2010-07-21T15:44:10.000+0200},
1103 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1104 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1105 date = {2010-05-03},
1106 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1107 interhash = {bc34a5f04661fee24ee62c39e76361be},
1108 intrahash = {28889a4ab329da28559f0910469f054b},
1109 journal = {Expert Systems with Applications},
1112 pages = {3292-3301},
1113 timestamp = {2010-07-21T15:44:10.000+0200},
1114 title = {High payload steganography mechanism using hybrid edge detector.},
1115 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1120 @article{DBLP:journals/tifs/FillerJF11,
1121 added-at = {2011-09-29T00:00:00.000+0200},
1122 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1123 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1124 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1125 interhash = {b27d23ed0c9936d568e16c51378abccd},
1126 intrahash = {50e43c05a74eec17524b3df8db442da5},
1127 journal = {IEEE Transactions on Information Forensics and Security},
1131 timestamp = {2011-09-29T00:00:00.000+0200},
1132 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1133 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1141 @inproceedings{DBLP:conf/ih/KimDR06,
1142 added-at = {2007-09-20T00:00:00.000+0200},
1143 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1144 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1145 booktitle = {Information Hiding},
1146 crossref = {DBLP:conf/ih/2006},
1147 date = {2007-09-20},
1148 description = {dblp},
1149 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1150 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1151 interhash = {399aab122b39cfd6f6e951a1b276c786},
1152 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1153 isbn = {978-3-540-74123-7},
1157 publisher = springer,
1158 address = springer_loc,
1160 timestamp = {2007-09-20T00:00:00.000+0200},
1161 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1162 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1168 @proceedings{DBLP:conf/ih/2006,
1169 editor = {Jan Camenisch and
1170 Christian S. Collberg and
1173 title = {Information Hiding, 8th International Workshop, IH 2006,
1174 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1175 booktitle = {Information Hiding},
1176 publisher = springer,
1177 address = springer_loc,
1181 isbn = {978-3-540-74123-7},
1182 bibsource = {DBLP, http://dblp.uni-trier.de}
1187 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1188 author = {Jessica J. Fridrich and
1189 Tom{\'a}s Pevn{\'y} and
1191 title = {Statistically undetectable jpeg steganography: dead ends
1192 challenges, and opportunities},
1194 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1195 editor = {Deepa Kundur and
1196 Balakrishnan Prabhakaran and
1198 Jessica J. Fridrich},
1199 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1200 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1202 address = {New York, NY, USA},
1205 isbn = {978-1-59593-857-2},
1206 bibsource = {DBLP, http://dblp.uni-trier.de}
1212 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1213 editor = {Nasir D. Memon and
1215 Adnan M. Alattar and
1217 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1218 Electronic Imaging Symposium, San Jose, CA, USA, January
1219 18-20, 2010, Proceedings},
1220 author = {Tom{\'a}s Filler and
1222 Jessica J. Fridrich},
1223 title = {Minimizing embedding impact in steganography using trellis-coded
1227 ee = {http://dx.doi.org/10.1117/12.838002},
1228 bibsource = {DBLP, http://dblp.uni-trier.de},
1232 series = {SPIE Proceedings},
1243 @proceedings{DBLP:conf/mediaforensics/2010,
1244 editor = {Nasir D. Memon and
1246 Adnan M. Alattar and
1248 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1249 Electronic Imaging Symposium, San Jose, CA, USA, January
1250 18-20, 2010, Proceedings},
1251 booktitle = {Media Forensics and Security},
1254 series = {SPIE Proceedings},
1257 isbn = {978-0-8194-7934-1},
1258 bibsource = {DBLP, http://dblp.uni-trier.de}
1261 @article{DBLP:journals/corr/abs-1112-5239,
1262 author = {Jacques M. Bahi and
1263 Rapha{\"e}l Couturier and
1264 Christophe Guyeux and
1265 Pierre-Cyrille H{\'e}am},
1266 title = {Efficient and Cryptographically Secure Generation of Chaotic
1267 Pseudorandom Numbers on GPU},
1269 volume = {abs/1112.5239},
1271 ee = {http://arxiv.org/abs/1112.5239},
1272 bibsource = {DBLP, http://dblp.uni-trier.de}
1276 author = {Ponomarenko, Nikolay},
1277 title = {PSNR-HVS-M page},
1278 OPThowpublished = {},
1281 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1287 author = {Bovik, Alan C.},
1288 title = {BIQI page},
1289 OPThowpublished = {},
1292 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1297 @InProceedings{PSECAL07,
1298 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1299 title = {On between-coefficient contrast masking of DCT basis functions},
1300 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1303 editor = {Li,Baoxin},
1309 OPTorganization = {},
1317 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1318 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1319 journal = {IEEE Signal Processing Letters},
1330 @inproceedings{DBLP:conf/crypto/ShubBB82,
1331 author = {Lenore Blum and
1334 title = {Comparison of Two Pseudo-Random Number Generators},
1335 editor = {David Chaum and
1336 Ronald L. Rivest and
1338 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1339 Barbara, California, USA, August 23-25, 1982},
1341 bibsource = {DBLP, http://dblp.uni-trier.de},
1342 publisher = {Plenum Press},
1343 address={New York, NY, USA},
1346 bibsource = {DBLP, http://dblp.uni-trier.de}
1350 @inproceedings{Blum:1985:EPP:19478.19501,
1351 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1352 Barbara, California, USA, August 19-22, 1984, Proceedings},
1353 author = {Manuel Blum and
1355 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1356 Which Hides All Partial Information},
1360 editor = {G. R. Blakley and
1362 publisher = springer,
1363 address = springer_loc,
1370 @article{DBLP:journals/ejisec/FontaineG07,
1371 author = {Caroline Fontaine and
1373 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1374 journal = {EURASIP Journal on Information Security},
1379 ee = {http://dx.doi.org/10.1155/2007/13801},
1380 bibsource = {DBLP, http://dblp.uni-trier.de}
1384 @article{Luo:2010:EAI:1824719.1824720,
1385 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1386 title = {Edge adaptive image steganography based on LSB matching revisited},
1387 journal = {IEEE Transactions on Information Forensics and Security},
1395 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1396 doi = {10.1109/TIFS.2010.2041812},
1398 publisher = {IEEE Press},
1399 address = {Piscataway, NJ, USA},
1400 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1403 @article{Mielikainen06,
1404 author = {Mielikainen, J.},
1405 title = {LSB Matching Revisited},
1406 journal = {IEEE Signal Processing Letters},
1421 @article{Liu:2008:FMP:1284917.1285196,
1422 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1423 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1424 journal = {Pattern Recogn.},
1425 issue_date = {January, 2008},
1433 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1434 doi = {10.1016/j.patcog.2007.06.005},
1436 publisher = {Elsevier Science Inc.},
1437 address = {New York, NY, USA},
1438 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1443 @InProceedings{LHS08,
1444 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1445 title = {Textural features based universal steganalysis},
1448 booktitle = {Proc. SPIE 6819},
1459 OPTorganization = {},
1466 @InProceedings{KF11,
1467 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1468 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1471 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1475 pages = {78800L-78800L-13},
1484 OPTorganization = {},
1490 @article{DBLP:journals/tifs/KodovskyFH12,
1491 author = {Jan Kodovsk{\'y} and
1492 Jessica J. Fridrich and
1494 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1495 journal = {IEEE Transactions on Information Forensics and Security},
1500 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1501 bibsource = {DBLP, http://dblp.uni-trier.de}
1506 @article{Fillatre:2012:ASL:2333143.2333587,
1507 author = {Fillatre, Lionel},
1508 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1509 journal = {IEEE Transactions on Signal Processing},
1517 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1518 doi = {10.1109/TSP.2011.2174231},
1520 publisher = {IEEE Press},
1521 address = {Piscataway, NJ, USA},
1525 @inproceedings{Tyan1993,
1526 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1527 address = ieecs_loc,
1529 author = {Tyan, C. Y. and Wang, P. P.},
1530 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1531 citeulike-article-id = {7936501},
1532 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1534 posted-at = {2010-10-01 17:27:48},
1537 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1543 @article{Canny:1986:CAE:11274.11275,
1544 author = {Canny, J},
1545 title = {A Computational Approach to Edge Detection},
1546 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1547 issue_date = {June 1986},
1555 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1556 doi = {10.1109/TPAMI.1986.4767851},
1558 publisher = {IEEE Computer Society},
1559 address = {Washington, DC, USA},
1560 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1564 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1565 author = {Jessica J. Fridrich and
1566 Jan Kodovsk{\'y} and
1569 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1571 booktitle = {Information Hiding},
1574 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1575 crossref = {DBLP:conf/ih/2011},
1576 bibsource = {DBLP, http://dblp.uni-trier.de}
1578 @proceedings{DBLP:conf/ih/2011,
1579 editor = {Tom{\'a}s Filler and
1580 Tom{\'a}s Pevn{\'y} and
1583 title = {Information Hiding - 13th International Conference, IH 2011,
1584 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1586 booktitle = {Information Hiding},
1587 publisher = springer,
1588 address = springer_loc,
1592 isbn = {978-3-642-24177-2},
1593 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1594 bibsource = {DBLP, http://dblp.uni-trier.de}
1597 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1598 author = {Jessica J. Fridrich},
1599 title = {Modern Trends in Steganography and Steganalysis},
1603 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1604 crossref = {DBLP:conf/iwdw/2011},
1605 bibsource = {DBLP, http://dblp.uni-trier.de}
1607 @proceedings{DBLP:conf/iwdw/2011,
1608 editor = {Yun-Qing Shi and
1609 Hyoung-Joong Kim and
1610 Fernando P{\'e}rez-Gonz{\'a}lez},
1611 title = {Digital Forensics and Watermarking - 10th International
1612 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1613 2011, Revised Selected Papers},
1615 publisher = springer,
1616 address = springer_loc,
1620 isbn = {978-3-642-32204-4},
1621 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1622 bibsource = {DBLP, http://dblp.uni-trier.de}
1628 @article{MCErlang07,
1629 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1630 title = {McErlang: a model checker for a distributed functional programming language},
1631 journal = {SIGPLAN Not.},
1640 @inproceedings{Bogor03,
1642 Matthew B. Dwyer and
1644 title = {Bogor: an extensible and highly-modular software model checking
1646 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1647 of Software Engineering 2003},
1655 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1656 title = {On Devaney's Definition of Chaos},
1657 journal = {Amer. Math. Monthly},
1663 timestamp = {27/01/2008}
1666 @article{Crook2007267,
1667 title = "Pattern recall in networks of chaotic neurons",
1668 journal = "Biosystems",
1671 pages = "267 - 274",
1674 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1675 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1677 keywords = "Spiking neural network"
1681 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1682 title = {A novel Hash algorithm construction based on chaotic neural network},
1683 journal = {Neural Computing and Applications},
1686 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1689 keyword = {Computer Science},
1690 publisher = {Springer London}
1694 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1695 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1701 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1702 doi={10.1109/TCE.2004.1309431},
1705 @article{Zhang2005759,
1706 title = "An image encryption approach based on chaotic maps",
1707 journal = "Chaos, Solitons \& Fractals",
1710 pages = "759 - 765",
1714 doi = "10.1016/j.chaos.2004.09.035",
1715 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1718 @article{Lian20091296,
1719 title = "A block cipher based on chaotic neural networks",
1720 journal = "Neurocomputing",
1723 pages = "1296 - 1301",
1726 author = "Shiguo Lian",
1727 keywords = "Neural network",
1729 keywords = "Security",
1730 keywords = "Block cipher",
1731 keywords = "Image encryption"
1735 author = {George Cybenko},
1736 title = {Approximation by Superpositions of a Sigmoidal function},
1737 journal = {Mathematics of Control, Signals and Systems},
1744 @article{DBLP:journals/nn/HornikSW89,
1745 author = {Kurt Hornik and
1746 Maxwell B. Stinchcombe and
1748 title = {Multilayer feedforward networks are universal approximators},
1749 journal = {Neural Networks},
1754 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1755 bibsource = {DBLP, http://dblp.uni-trier.de}
1758 @article{dalkiran10,
1759 author = {Ilker Dalkiran and Kenan Danisman},
1760 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1761 title = {Artificial neural network based chaotic generator for cryptology},
1769 @article{springerlink:10.1007/s00521-010-0432-2,
1770 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1771 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1772 title = {A novel Hash algorithm construction based on chaotic neural network},
1773 journal = {Neural Computing and Applications},
1774 publisher = {Springer},
1776 keyword = {Computer Science},
1782 @article{Feder2009NTB,
1783 author = {Feder, Tom\'{a}s and Subi, Carlos},
1784 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
1785 journal = {Inf. Process. Lett.},
1786 issue_date = {February, 2009},
1794 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
1795 doi = {10.1016/j.ipl.2008.10.015},
1797 publisher = {Elsevier North-Holland, Inc.},
1798 address = {Amsterdam, The Netherlands, The Netherlands},
1799 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
1805 author={Zanten, A.~J.~van and Suparta, I.~N.},
1806 title={ Totally balanced and exponentially balanced Gray codes},
1807 journal={Discrete Analysis and Operational Research},
1818 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1821 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
1822 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
1823 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},