1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @inproceedings{DBLP:conf/apsipa/TanL14,
5 author = {Shunquan Tan and
7 title = {Stacked convolutional auto-encoders for steganalysis of digital images},
8 booktitle = {Asia-Pacific Signal and Information Processing Association Annual
9 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
13 crossref = {DBLP:conf/apsipa/2014},
14 url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
15 doi = {10.1109/APSIPA.2014.7041565},
16 timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
17 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
18 bibsource = {dblp computer science bibliography, http://dblp.org}
20 @proceedings{DBLP:conf/apsipa/2014,
21 title = {Asia-Pacific Signal and Information Processing Association Annual
22 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
26 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
27 isbn = {978-6-1636-1823-8},
28 timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
29 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
30 bibsource = {dblp computer science bibliography, http://dblp.org}
33 @inproceeding{doi:10.1117/12.2083479,
34 author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
36 Deep learning for steganalysis via convolutional neural networks
38 journal = {Proc. SPIE},
41 pages = {94090J-94090J-10},
43 Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
46 doi = {10.1117/12.2083479},
47 URL = { http://dx.doi.org/10.1117/12.2083479},
53 @inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
54 author = {Dan Claudiu Ciresan and
57 Luca Maria Gambardella and
58 J{\"{u}}rgen Schmidhuber},
59 title = {Flexible, High Performance Convolutional Neural Networks for Image
61 booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
62 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
66 crossref = {DBLP:conf/ijcai/2011},
67 url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
68 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
69 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
70 bibsource = {dblp computer science bibliography, http://dblp.org}
73 @proceedings{DBLP:conf/ijcai/2011,
74 editor = {Toby Walsh},
75 title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
76 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
78 publisher = {{IJCAI/AAAI}},
80 isbn = {978-1-57735-516-8},
81 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
82 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
83 bibsource = {dblp computer science bibliography, http://dblp.org}
87 @article{DBLP:journals/ftsig/DengY14,
90 title = {Deep Learning: Methods and Applications},
91 journal = {Foundations and Trends in Signal Processing},
96 url = {http://dx.doi.org/10.1561/2000000039},
97 doi = {10.1561/2000000039},
98 timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
99 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
100 bibsource = {dblp computer science bibliography, http://dblp.org}
105 journal={Multimedia Tools and Applications},
106 title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
107 publisher={Springer US},
108 author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and
116 author = {Chen, Brian and Wornell, Gregory W.},
117 title = {Provably robust digital watermarking},
118 journal = {Proc. SPIE},
123 doi = {10.1117/12.371232},
124 URL = { http://dx.doi.org/10.1117/12.371232},
129 author={Darazi, R. and Hu, R. and Macq, B.},
130 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
131 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
134 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
135 doi={10.1109/ICASSP.2010.5495455},
139 @INPROCEEDINGS{WLSYNW13,
140 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
141 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
142 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
145 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
146 doi={10.1109/ICIP.2013.6738931},
153 journal={Journal of VLSI signal processing systems for signal, image and video technology},
156 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
157 publisher={Kluwer Academic Publishers},
158 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
159 author={Chen, Brian and Wornell, Gregory W.},
164 author = {Wang, C. T. and Tsai, W. H. },
165 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
168 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
177 OPTorganization = {},
183 @article{DBLP:journals/sigpro/LeeT10,
184 author = {I{-}Shi Lee and
186 title = {A new approach to covert communication via {PDF} files},
187 journal = {Signal Processing},
192 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
193 doi = {10.1016/j.sigpro.2009.07.022},
194 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
195 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
196 bibsource = {dblp computer science bibliography, http://dblp.org}
201 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
202 title = {A Copyright Protection Scheme Based on PDF},
203 journal = {International Journal of Innovative Computing, Information and Control},
210 note = {ISSN 1349-4198},
215 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
216 title = {Using Steganography to hide messages inside PDF files},
217 howpublished = {SSN Project Report},
223 @InProceedings{PD2008,
224 author = {POR, L. Y. and Delina, B.},
225 title = {Information Hiding: A New Approach in Text Steganography},
226 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
235 OPTorganization = {},
241 @article{DBLP:journals/tifs/PevnyBF10,
242 author = {Tom{\'{a}}s Pevn{\'{y}} and
244 Jessica J. Fridrich},
245 title = {Steganalysis by subtractive pixel adjacency matrix},
246 journal = {{IEEE} Transactions on Information Forensics and Security},
251 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
252 doi = {10.1109/TIFS.2010.2045842},
253 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
254 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
255 bibsource = {dblp computer science bibliography, http://dblp.org}
259 @INPROCEEDINGS{rifq/others03,
260 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
263 x-international-audience = {yes},
264 title = {{D}iscrimination power of measures of resemblance},
265 booktitle = {{IFSA}'03},
267 location = {Istanbul, Turkey}
271 @ARTICLE{Rifqi:2000:DPM:342947.342970,
272 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
275 x-international-audience = {yes},
276 title = {{D}iscrimination power of measures of comparison},
277 journal = {{F}uzzy {S}ets and {S}ystems},
285 @book{Anderberg-Cluster-1973,
286 added-at = {2008-10-29T00:31:48.000+0100},
287 author = {Anderberg, M. R.},
288 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
289 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
290 intrahash = {f586cc49441c591f06539d11d3e06006},
291 keywords = {cluster_analysis wismasys0809},
292 publisher = {Academic Press},
293 timestamp = {2008-10-29T00:31:48.000+0100},
294 title = {Cluster Analysis for Applications},
300 @article{yule1950introduction,
301 Author = {Yule, G.U. and Kendall, MG},
302 Date-Added = {2009-08-14 22:16:50 -0500},
303 Date-Modified = {2009-08-14 22:16:50 -0500},
304 Journal = {Statistics},
305 Title = {An Introduction to the Theory of},
309 @inproceedings{fgb11:ip,
311 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
314 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
315 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
316 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
318 address = {Sevilla, Spain},
319 editor = {Javier Lopez and Pierangela Samarati},
320 publisher = {SciTePress},
328 author = {Cayre, F. and Bas, P.},
329 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
330 journal = {IEEE Transactions on Information Forensics and Security},
335 doi = {10.1109/TIFS.2007.916006},
337 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
338 security, watermarking, Kerckhoffs-based embedding security classes,
339 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
340 steganography security, watermark-only-attack, watermarking, Security,
341 spread-spectrum (SS) watermarking},
343 timestamp = {2009.06.29}
345 @INPROCEEDINGS{Perez06,
346 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
347 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
349 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
361 author = {Cayre, F. and Fontaine, C. and Furon, T.},
362 title = {Watermarking security: theory and practice},
363 journal = {IEEE Transactions on Signal Processing},
366 pages = {3976--3987},
368 keywords = {blind source separation, cryptography, watermarking, Fisher information
369 matrix, blind source separation, cryptanalysis, information theory,
370 spread spectrum techniques, substitutive scheme, watermarking security,
371 Blind source separation, Fisher information matrix, equivocation,
372 security, watermarking}
377 @inproceedings{Shujun1,
378 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
379 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
380 Their Roles in Cryptography and Pseudo-Random Coding},
381 booktitle = {Cryptography and Coding, 8th IMA International Conference,
385 publisher = springer,
386 address = springer_loc,
394 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
397 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
398 title = {Random Walk in a N-cube Without Hamiltonian Cycle
399 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
401 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
409 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
412 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
413 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
414 howpublished = {in submission to the ACM Computing Surveys journal},
421 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
427 Couchot, Jean-Fran{\c}cois and
428 Couturier, Rapha\¨el},
429 title = {Blind digital watermarking in PDF documents using
430 Spread Transform Dither Modulation},
431 howpublished = {in submission to the Multimedia Tools and Applications journal},
440 @inproceedings{couchot04:onp,
442 author = {Couchot, Jean-Fran\c{c}ois},
443 title = {V\'erification d'invariant par superposition},
444 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
445 address = {Calais, France},
446 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
447 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
448 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
449 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
458 @inproceedings{aangc+15:ip,
460 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
463 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
464 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
465 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
467 doi = {10.1007/978-3-319-16483-0_38},
468 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
471 address = {Granada, Spain},
483 @inproceedings{agcs+15:ip,
485 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
488 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
489 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
490 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
491 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
493 series = {LNCS/LNBI},
495 publisher = {Springer},
496 address = {Mexico City, Mexico},
500 note = {To appear in the LNCS/LNBI series},
506 @inproceedings{bcg11:ip,
508 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
511 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
512 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
513 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
515 address = {Luxembourg, Luxembourg},
518 note = {Best paper award},
524 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
526 classement = {ACLNI},
529 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
530 title = {Quality analysis of a chaotic proven keyed hash function},
531 journal = {International Journal On Advances in Internet Technology},
543 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
548 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
549 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
550 journal = {Annals of Telecommunications},
551 doi = {10.1007/s12243-015-0466-7},
552 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
553 publisher = {Springer},
555 note = {Available online. Paper version to appear},
559 @inproceedings{fccg15:ip,
561 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
564 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
565 title = {Steganalyzer performances in operational contexts},
566 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
568 address = {Adelaide, Australia},
576 @inproceedings{bcfg12a:ip,
578 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
581 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
582 title = {Application of Steganography for Anonymity through the Internet},
583 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
585 url = {http://arxiv.org/abs/1202.5302v1},
586 address = {Venice, Italy},
593 @inproceedings{bcfg+13:ip,
595 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
598 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
599 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
600 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
602 doi = {10.1109/IIH-MSP.2013.141},
603 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
604 address = {Beijing, China},
610 @inproceedings{bcfg12b:ip,
612 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
615 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
616 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
617 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
619 address = {Venice, Italy},
629 @inproceedings{bcg11b:ip,
631 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
634 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
635 title = {Steganography: a Class of Algorithms having Secure Properties},
636 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
638 address = {Dalian, China},
647 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
650 impact-factor ={1.363},
651 isi-acro = {COMPUT J},
652 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
653 title = {Steganography: a class of secure and robust algorithms},
654 journal = {The Computer Journal},
658 doi = {10.1093/comjnl/bxr116},
659 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
660 publisher = {Oxford University Press},
666 @inproceedings{bcgw11:ip,
668 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
671 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
672 title = {Class of Trustworthy Pseudo Random Number Generators},
673 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
675 address = {Luxembourg, Luxembourg},
683 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
686 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
687 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
688 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
698 @inproceedings{aagp+15:ip,
700 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
702 classement = {ACTIN},
703 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
704 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
705 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
707 address = {Naples, Italy},
715 @inproceedings{acgm+14:ij,
717 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
720 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
721 title = {Finding the Core-Genes of Chloroplasts},
722 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
724 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
726 doi = {10.7763/IJBBB.2014.V4.371},
727 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
728 address = {Copenhagen, Denmark},
738 @inproceedings{akgcs+14:oip,
740 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
743 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
744 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
745 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
746 address = {Belfast, United Kingdom},
750 note = {Short paper},
755 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
758 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
759 title = {Finding the core-genes of Chloroplast Species},
760 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
770 @PhdThesis{guyeuxphd,
771 author = {Guyeux, Christophe},
772 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
773 type = {Th\`ese de {D}octorat},
774 school = {LIFC, Universit\'e de Franche-Comt\'e},
776 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
777 month = {13 décembre},
782 @inproceedings{chgw+14:oip,
784 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
786 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
787 title = {Pseudorandom Number Generators with Balanced Gray Codes},
788 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
790 address = {Vienna, Austria},
796 @inproceedings{ccfg16:ip,
797 author = {Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra Ahmed Fadil and Christophe Guyeux},
798 title = {A Second Order Derivatives based Approach for Steganography},
799 booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
810 Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.
814 @INPROCEEDINGS{nusmv02,
815 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
816 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
817 Sebastiani and Armando Tacchella},
818 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
822 crossref = {DBLP:conf/cav/2002}
826 author = {Nishanth Chandrasekaran},
827 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
832 Author = "Gastin, P. and Oddoux, D.",
833 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
834 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
835 Publisher = "Springer",
842 @inproceedings{cg04:np,
844 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
845 title = {Analyse d'atteignabilit\'e d\'eductive},
846 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
848 editor = {Julliand, Jacques},
849 address = {Besan\c{c}on, France},
858 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
859 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
860 journal = {Journal of the Brazilian Computer Society (JBCS)},
864 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
867 note = {ISSN 0104-6500},
872 @inproceedings{cddg+04:ip,
874 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
876 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
877 title = {Proving and Debugging Set-Based Specifications},
878 booktitle = {WMF'03 proceedings},
879 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
882 editor = {A. Cavalcanti and P. Machado},
883 address = {Campina Grande, Brazil},
884 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
891 @inproceedings{cdgr04:onp,
893 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
894 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
896 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
897 address = {Besan\c{c}on, France},
900 editor = {Julliand, Jacques},
901 note = {Session outils},
906 @INPROCEEDINGS{CGK05,
907 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
908 title = {A uniform deductive approach for parameterized protocol safety},
912 bibsource = {DBLP, http://dblp.uni-trier.de},
913 crossref = {DBLP:conf/kbse/2005},
914 ee = {http://doi.acm.org/10.1145/1101908.1101971}
917 @INPROCEEDINGS{abcvs05,
918 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
919 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
921 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
925 address = {Guelph, Canada},
927 note = {ISSN 1492-8760}
931 author = {Bahi, J. M.},
932 title = {Boolean totally asynchronous iterations},
940 author = {Bahi, J. M. and Contassot-Vivier, S.},
941 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
951 author = {Bahi, J. M. and Contassot-Vivier, S.},
952 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
957 pages = {1353--1363},
962 @inproceedings{bcgr11:ip,
964 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
967 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
968 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
969 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
973 doi = {10.1007/978-3-642-22953-4_11},
974 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
975 address = {Oslo, Norway},
983 @techreport{BCVC10:ir,
984 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
985 title = {Convergence Results of Combining Synchronism and Asynchronism for
986 Discrete-State Discrete-Time Dynamic Network},
988 institution = {LIFC - Laboratoire d’{I}nformatique de
989 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
990 type = {Research Report},
991 number = {RR2010-02},
992 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
996 @techreport{Cou10:ir,
997 author = {Couchot, J.-F.},
998 title = {Formal {C}onvergence {P}roof for {D}iscrete
999 {D}ynamical {S}ystems},
1000 institution = {LIFC - Laboratoire d’{I}nformatique de
1001 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1002 type = {Research Report},
1003 number = {RR2010-03},
1004 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
1012 author = {Bahi, J. M. and Michel, C.},
1013 title = {Convergence of discrete asynchronous iterations},
1014 journal = {International Journal Computer Mathematics},
1021 author = {Bahi, J. M. and Michel, C.},
1022 title = {Simulations of asynchronous evolution of discrete systems},
1023 journal = {Simulation Practice and Theory},
1031 author = {G\'{e}rard M. Baudet},
1032 title = {Asynchronous Iterative Methods for Multiprocessors},
1038 doi = {http://doi.acm.org/10.1145/322063.322067},
1044 title = {Parallel and distributed computation: numerical methods},
1045 publisher = prenticeHall,
1047 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1048 isbn = {0-13-648700-9}
1052 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
1053 title = {The software model checker Blast},
1061 @INPROCEEDINGS{LeCun85,
1062 author = {Y Le~Cun},
1063 title = {A learning scheme for threshold networks},
1064 booktitle = {Cognitiva'95},
1067 address = {Paris, France}
1071 author = {Jeffrey L. Elman},
1072 title = {Finding Structure in Time},
1073 journal = {Cognitive Science},
1080 author = {Andreas Frommer and Daniel B. Szyld},
1081 title = {On asynchronous iterations},
1087 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
1089 publisher = elsevier
1093 author = {Goles Ch., E. and Salinas,L.},
1094 title = {Comparison between parallel and serial dynamics of Boolean networks},
1103 title = {The SPIN Model Checker: Primer and Reference Manual},
1104 publisher = {Addison-Wesley, Pearson Education},
1106 author = {Gerard J. Holzmann}
1110 author = {Shih M.-H. and Ho, J.-L.},
1111 title = {Solution of the Boolean Markus-Yamabe Problem},
1112 journal = advapplMath,
1120 author = {Adrien Richard},
1121 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1123 journal = advapplMath,
1128 publisher = elsevier
1132 author = {Adrien Richard and Jean-Paul Comet},
1133 title = {Necessary conditions for multistationarity in discrete dynamical
1135 journal = discreteapplMath,
1138 pages = {2403--2413},
1141 publisher = elsevier
1145 title = {Les syst\`emes dynamiques discrets},
1146 publisher = springer,
1148 author = {F. Robert},
1150 series = {Math\'ematiques et Applications}
1154 author = {Shih, M.-H. and Dong J.-L.},
1155 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1156 journal = advapplMath,
1165 author = {Thomas, R.},
1166 title = {Boolean Formalization of Genetic Control Circuits},
1174 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1175 title = {Absence of Cycles in Symmetric Neural Networks},
1179 pages = {1235-1249},
1181 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1184 @PROCEEDINGS{DBLP:conf/cav/2002,
1185 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1186 Denmark, July 27-31, 2002, Proceedings},
1188 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1191 publisher = springer,
1195 @PROCEEDINGS{DBLP:conf/kbse/2005,
1196 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1197 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1199 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1201 bibsource = {DBLP, http://dblp.uni-trier.de},
1206 author = {Ben-Ari, Mordechai},
1208 title = {Principles of the Spin Model Checker},
1209 isbn = {1846287693, 9781846287695}},
1210 publisher = springer,
1214 @INPROCEEDINGS{Wei97,
1215 author = {Weise,Carsten},
1216 title = {An incremental formal semantics for {PROMELA}},
1217 booktitle = {SPIN97, the Third SPIN Workshop},
1222 @PHDTHESIS{Couchot-PhD06,
1223 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1224 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1227 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1228 TYPE = {Th\`ese de {D}octorat},
1233 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1234 Page, M. and Tewfik, S. and Geiselmann, J.},
1235 title = {Qualitative simulation of genetic regulatory networks
1236 using piecewise-linear models},
1237 journal = {Bull. Math. Biol.},
1249 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1250 title = {A Fruitful Application of Formal Methods to Biological
1251 Regulatory Networks: Extending {T}homas' Asynchronous
1252 Logical Approach with Temporal Logic},
1253 journal = {J. Theor. Biol.},
1263 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1264 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1265 journal = {Biosystems},
1277 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1279 title = {Genetic Network Analyzer: qualitative simulation
1280 of genetic regulatory networks.},
1281 journal = {Bioinformatics},
1289 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1290 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1291 journal = {Genes, Genomes and Genomics},
1303 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1304 title = {Analysing formal models of genetic regulatory networks with delays},
1305 journal = {Int. J. Bioinformatics Res. Appl.},
1311 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1312 publisher = {Inderscience Publishers},
1313 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1316 author = {Richard, A.},
1317 title = {Local negative circuits and fixed points in Boolean networks},
1318 institution = {preprint arXiv number 0910.0750},
1331 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1332 title = {Graphic requirement for multistability and attractive cycles in a
1333 Boolean dynamical framework},
1334 journal = {Advances in Applied Mathematics},
1340 timestamp = {2009.02.05}
1343 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1344 author = {Jacques M. Bahi and
1345 Sylvain Contassot-Vivier and
1349 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1350 in Heterogeneous Environments},
1351 booktitle = {ICANN (2)},
1354 ee = {http://dx.doi.org/10.1007/11840930_81},
1355 crossref = {DBLP:conf/icann/2006-2},
1356 bibsource = {DBLP, http://dblp.uni-trier.de}
1359 @proceedings{DBLP:conf/icann/2006-2,
1360 editor = {Stefanos D. Kollias and
1361 Andreas Stafylopatis and
1364 title = {Artificial Neural Networks - ICANN 2006, 16th International
1365 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1367 booktitle = {ICANN (2)},
1368 publisher = {Springer},
1369 series = {Lecture Notes in Computer Science},
1372 isbn = {3-540-38871-0},
1373 bibsource = {DBLP, http://dblp.uni-trier.de}
1380 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1382 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1383 publisher = {Eyrolles},
1401 title = {An Introduction to Chaotic Dynamical Systems},
1402 publisher = {Redwood City: Addison-Wesley},
1404 author = {R. L. Devaney},
1407 timestamp = {27/01/2008}
1413 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1415 classement = {ACLI},
1416 impact-factor ={1.255},
1417 isi-acro = {MECHATRONICS},
1418 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1419 title = {Active {MEMS}-based flow control using artificial neural network},
1420 journal = {Mechatronics},
1424 doi = {10.1016/j.mechatronics.2013.02.010},
1425 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1426 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1427 publisher = {Elsevier},
1430 note = {Available online. Paper version to appear},
1435 @inproceedings{cds12:ip,
1437 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1439 classement = {ACTI},
1440 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1441 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1442 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1444 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1445 address = {Besan\c{c}on, France},
1446 publisher = {IEEE CPS},
1455 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1457 classement = {ACLI},
1458 impact-factor ={2.081},
1460 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1461 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1462 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1465 pages = {013122-1 -- 013122-9},
1466 doi = {10.1063/1.3685524},
1467 url = {http://dx.doi.org/10.1063/1.3685524},
1468 publisher = {American Institute of Physics},
1476 @inproceedings{bgs11:ip,
1478 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1480 classement = {ACTI},
1481 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1482 title = {Building a Chaotic Proven Neural Network},
1483 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1484 address = {Maldives, Maldives},
1490 author = {Bahi, Jacques M. and Guyeux, Christophe},
1491 title = {Hash Functions Using Chaotic Iterations},
1492 journal = {Journal of Algorithms \& Computational Technology},
1497 classement = {ACLNI},
1498 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1500 impact-factor = {#},
1507 @PHDTHESIS{GuyeuxThese10,
1508 author = {Christophe Guyeux},
1509 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1510 en s\'{e}curit\'{e} informatique},
1511 school = {Universit\'{e} de Franche-Comt\'{e}},
1513 owner = {christophe},
1514 timestamp = {2010.12.21}
1517 @INPROCEEDINGS{gfb10:ip,
1518 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1519 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1520 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1521 Multimedia Signal Processing},
1524 address = {Darmstadt, Germany},
1526 classement = {ACTI},
1527 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1534 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1535 title = {Topological entropy},
1536 journal = {Transactions of the American Mathematical Society},
1541 timestamp = {2008.05.29}
1545 author = {Rufus Bowen},
1546 title = {Entropy for group endomorphisms and homogeneous spaces},
1547 journal = {Transactions of the American Mathematical Society},
1552 timestamp = {15/02/2008}
1555 @article{10.1109/CIMSiM.2010.36,
1556 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1557 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1558 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1562 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1563 publisher = {IEEE Computer Society},
1564 address = {Los Alamitos, CA, USA},
1566 @article{10.1109/ICME.2003.1221665,
1567 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1568 title = {Neural network based steganalysis in still images},
1569 journal ={Multimedia and Expo, IEEE International Conference on},
1573 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1574 publisher = {IEEE Computer Society},
1575 address = {Los Alamitos, CA, USA},
1578 @ARTICLE{Sullivan06steganalysisfor,
1579 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1580 title = {Steganalysis for Markov cover data with applications to images},
1581 journal = {IEEE Transactions on Information Forensics and Security},
1590 author = "Gray, Frank",
1591 title = "Pulse code communication",
1592 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1597 @INPROCEEDINGS{guyeux10ter,
1598 author = {Bahi, Jacques M. and Guyeux, Christophe},
1599 title = {A new chaos-based watermarking algorithm},
1600 booktitle = {SECRYPT'10, International Conference on Security
1604 address = {Athens, Greece},
1606 publisher = {SciTePress},
1607 classement = {ACTI},
1608 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1614 @inproceedings{Qiao:2009:SM:1704555.1704664,
1615 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1616 title = {Steganalysis of MP3Stego},
1617 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1618 series = {IJCNN'09},
1620 location = {Atlanta, Georgia, USA},
1621 pages = {2723--2728},
1623 publisher = {IEEE Press}
1626 @inproceedings{CouchotD07IFM,
1628 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1631 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1632 title = {Guiding the Correction of Parameterized Specifications},
1633 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1637 publisher = {Springer},
1638 doi = {10.1007/978-3-540-73210-5_10},
1639 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1640 address = {Oxford, UK},
1646 @inproceedings{couchot07FTP,
1650 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1651 title = {A Graph-based Strategy for the Selection of Hypotheses},
1652 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1653 address = {Liverpool, UK},
1660 @inproceedings{cgs09:ip,
1662 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1664 classement = {ACTI},
1665 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1666 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1667 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1668 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1669 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1670 publisher = {ACM Press},
1672 url = {http://arxiv.org/abs/0907.1357},
1673 otherUrl = {http://hal.inria.fr/inria-00402204},
1674 address = {Grenoble, France},
1675 editor = {Hassen Sa\"{i}di and N. Shankar},
1682 @inproceedings{couchot07cade,
1686 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1687 title = {Handling Polymorphism in Automated Deduction},
1688 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1692 publisher = {Springer},
1693 isbn = {978-3-540-73594-6},
1694 doi = {10.1007/978-3-540-73595-3_18},
1695 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1696 address = {Bremen, Germany},
1708 @inproceedings{BCDG07,
1710 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1711 equipe = {vesontio},
1712 classement = {ACTI},
1713 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1714 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1715 booktitle = {B'2007, the 7th Int. B Conference},
1719 publisher = {Springer},
1720 doi = {10.1007/11955757_10},
1721 url = {http://dx.doi.org/10.1007/11955757_10},
1722 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1723 address = {Besancon, France},
1731 @article{byrd1995limited,
1732 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1733 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1734 journal = {SIAM J. Sci. Comput.},
1735 issue_date = {Sept. 1995},
1741 pages = {1190--1208},
1743 url = {http://dx.doi.org/10.1137/0916069},
1744 doi = {10.1137/0916069},
1746 publisher = {Society for Industrial and Applied Mathematics},
1747 address = {Philadelphia, PA, USA},
1748 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1751 @article{ANU:1770520,
1752 author = {Powell,M. J. D.},
1753 title = {Direct search algorithms for optimization calculations},
1754 journal = {Acta Numerica},
1761 doi = {10.1017/S0962492900002841},
1762 URL = {http://journals.cambridge.org/article_S0962492900002841},
1768 journal={The Journal of Supercomputing},
1771 doi={10.1007/s11227-010-0500-5},
1772 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1773 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1774 publisher={Springer US},
1775 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1776 author={Wang, Honggang},
1782 author={Yifeng He and Lee, I. and Ling Guan},
1783 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1784 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1789 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1790 doi={10.1109/TCSVT.2009.2017411},
1794 author={Palomar, D.P. and Mung Chiang},
1795 journal={Selected Areas in Communications, IEEE Journal on},
1796 title={A tutorial on decomposition methods for network utility maximization},
1801 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1802 doi={10.1109/JSAC.2006.879350},
1807 journal={EURASIP Journal on Information Security},
1811 doi={10.1186/1687-417X-2014-1},
1812 title={Universal distortion function for steganography in an arbitrary domain},
1813 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1814 publisher={Springer International Publishing},
1815 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1823 @inproceedings{conf/wifs/HolubF12,
1824 added-at = {2013-01-23T00:00:00.000+0100},
1825 author = {Holub, Vojtech and Fridrich, Jessica J.},
1826 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1828 crossref = {conf/wifs/2012},
1829 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1830 interhash = {cbef658a6868216eef585dd759ae0668},
1831 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1832 isbn = {978-1-4673-2285-0},
1836 timestamp = {2013-01-23T00:00:00.000+0100},
1837 title = {Designing steganographic distortion using directional filters.},
1838 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1842 @proceedings{conf/wifs/2012,
1843 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1844 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1845 publisher = {{IEEE}},
1847 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1848 isbn = {978-1-4673-2285-0},
1849 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1850 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1851 bibsource = {dblp computer science bibliography, http://dblp.org}
1855 @article{FillerJF11,
1856 author = {Tom{\'a}s Filler and
1858 Jessica J. Fridrich},
1859 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1861 journal = {IEEE Transactions on Information Forensics and Security},
1866 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1867 bibsource = {DBLP, http://dblp.uni-trier.de}
1870 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1871 editor = {Ira S. Moskowitz},
1872 author = {Shelby Pereira and
1873 Sviatoslav Voloshynovskiy and
1875 St{\'e}phane Marchand-Maillet and
1877 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1878 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1879 title = {Second Generation Benchmarking and Application Oriented
1884 publisher = springer,
1885 address = springer_loc,
1891 @inproceedings{DBLP:conf/ih/Westfeld01,
1892 added-at = {2011-06-28T00:00:00.000+0200},
1893 author = {Westfeld, Andreas},
1894 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1895 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1896 editor = {Ira S. Moskowitz},
1898 publisher = springer,
1899 address = springer_loc,
1902 title = {F5-A Steganographic Algorithm.},
1911 @article{Chang20101286,
1912 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1913 journal = "Digital Signal Processing",
1916 pages = "1286 - 1307",
1920 doi = "10.1016/j.dsp.2009.11.005",
1921 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1922 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1923 keywords = "Security",
1924 keywords = "Wet paper coding",
1925 keywords = "Steganography",
1926 keywords = "Indicator",
1927 keywords = "Fuzzy edge detector"
1932 @article{Hu:2007:HPE:1282866.1282944,
1933 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1934 title = {A high performance edge detector based on fuzzy inference rules},
1935 journal = {Inf. Sci.},
1936 issue_date = {November, 2007},
1942 pages = {4768--4784},
1944 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1945 doi = {10.1016/j.ins.2007.04.001},
1947 publisher = {Elsevier Science Inc.},
1948 address = {New York, NY, USA},
1949 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1953 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1954 author = {Sorina Dumitrescu and
1956 editor = {Ahmet M. Eskicioglu and
1957 Jessica J. Fridrich and
1959 title = {LSB steganalysis based on high-order statistics},
1960 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1961 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1964 address = {New York, NY, USA},
1967 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1968 bibsource = {DBLP, http://dblp.uni-trier.de}
1971 @inproceedings{DBLP:conf/ih/Ker05,
1972 author = {Andrew D. Ker},
1973 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1974 editor = {Mauro Barni and
1975 Jordi Herrera-Joancomart\'{\i} and
1976 Stefan Katzenbeisser and
1977 Fernando P{\'e}rez-Gonz{\'a}lez},
1978 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1979 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1982 ee = {http://dx.doi.org/10.1007/11558859_22},
1983 publisher = springer,
1984 address = springer_loc,
1991 @inproceedings{FK12,
1992 editor = {Matthias Kirchner and
1994 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1995 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1996 author = {Jessica J. Fridrich and
1998 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
2002 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
2004 publisher = springer,
2005 address = springer_loc,
2007 bibsource = {DBLP, http://dblp.uni-trier.de}
2011 @article{DBLP:journals/tsp/DumitrescuWW03,
2012 added-at = {2012-02-06T00:00:00.000+0100},
2013 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
2014 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
2015 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
2016 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
2017 intrahash = {556caad9b61980d3458885153a52321c},
2018 journal = {IEEE Transactions on Signal Processing},
2021 pages = {1995-2007},
2022 timestamp = {2012-02-06T00:00:00.000+0100},
2023 title = {Detection of LSB steganography via sample pair analysis.},
2024 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
2032 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
2033 editor = {Nicolas D. Georganas and
2034 Radu Popescu-Zeletin},
2035 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
2036 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
2038 author = {Jessica J. Fridrich and
2041 title = {Reliable detection of LSB steganography in color and grayscale
2045 ee = {http://doi.acm.org/10.1145/1232454.1232466},
2047 address = {New York, NY, USA},
2049 bibsource = {DBLP, http://dblp.uni-trier.de}
2056 @inproceedings{DBLP:conf/ih/PevnyFB10,
2057 author = {Tom{\'a}s Pevn{\'y} and
2058 Tom{\'a}s Filler and
2060 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
2062 editor = {Rainer B{\"o}hme and
2063 Philip W. L. Fong and
2064 Reihaneh Safavi-Naini},
2065 booktitle = {Information Hiding - 12th International Conference, IH 2010,
2066 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2071 publisher = springer,
2072 address = springer_loc,
2075 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
2076 bibsource = {DBLP, http://dblp.uni-trier.de}
2085 author = {Tom{\'a}s Pevn{\'y} and
2086 Tom{\'a}s Filler and
2089 title = {Break Our Steganographic System},
2090 OPThowpublished = {},
2093 note = {Available at \url{http://www.agents.cz/boss/}},
2097 @proceedings{DBLP:conf/ih/2010,
2098 editor = {Rainer B{\"o}hme and
2099 Philip W. L. Fong and
2100 Reihaneh Safavi-Naini},
2101 title = {Information Hiding - 12th International Conference, IH 2010,
2102 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2104 booktitle = {Information Hiding},
2105 publisher = springer,
2106 address = springer_loc,
2110 isbn = {978-3-642-16434-7},
2111 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
2112 bibsource = {DBLP, http://dblp.uni-trier.de}
2116 @article{DBLP:journals/eswa/ChenCL10,
2117 added-at = {2010-07-21T15:44:10.000+0200},
2118 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2119 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2120 date = {2010-05-03},
2121 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2122 interhash = {bc34a5f04661fee24ee62c39e76361be},
2123 intrahash = {28889a4ab329da28559f0910469f054b},
2124 journal = {Expert Systems with Applications},
2127 pages = {3292-3301},
2128 timestamp = {2010-07-21T15:44:10.000+0200},
2129 title = {High payload steganography mechanism using hybrid edge detector.},
2130 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2135 @article{DBLP:journals/tifs/FillerJF11,
2136 added-at = {2011-09-29T00:00:00.000+0200},
2137 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2138 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2139 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2140 interhash = {b27d23ed0c9936d568e16c51378abccd},
2141 intrahash = {50e43c05a74eec17524b3df8db442da5},
2142 journal = {IEEE Transactions on Information Forensics and Security},
2146 timestamp = {2011-09-29T00:00:00.000+0200},
2147 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2148 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2156 @inproceedings{DBLP:conf/ih/KimDR06,
2157 added-at = {2007-09-20T00:00:00.000+0200},
2158 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2159 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2160 booktitle = {Information Hiding},
2161 crossref = {DBLP:conf/ih/2006},
2162 date = {2007-09-20},
2163 description = {dblp},
2164 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2165 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2166 interhash = {399aab122b39cfd6f6e951a1b276c786},
2167 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2168 isbn = {978-3-540-74123-7},
2172 publisher = springer,
2173 address = springer_loc,
2175 timestamp = {2007-09-20T00:00:00.000+0200},
2176 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2177 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2183 @proceedings{DBLP:conf/ih/2006,
2184 editor = {Jan Camenisch and
2185 Christian S. Collberg and
2188 title = {Information Hiding, 8th International Workshop, IH 2006,
2189 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2190 booktitle = {Information Hiding},
2191 publisher = springer,
2192 address = springer_loc,
2196 isbn = {978-3-540-74123-7},
2197 bibsource = {DBLP, http://dblp.uni-trier.de}
2202 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2203 author = {Jessica J. Fridrich and
2204 Tom{\'a}s Pevn{\'y} and
2206 title = {Statistically undetectable jpeg steganography: dead ends
2207 challenges, and opportunities},
2209 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2210 editor = {Deepa Kundur and
2211 Balakrishnan Prabhakaran and
2213 Jessica J. Fridrich},
2214 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2215 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2217 address = {New York, NY, USA},
2220 isbn = {978-1-59593-857-2},
2221 bibsource = {DBLP, http://dblp.uni-trier.de}
2227 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2228 editor = {Nasir D. Memon and
2230 Adnan M. Alattar and
2232 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2233 Electronic Imaging Symposium, San Jose, CA, USA, January
2234 18-20, 2010, Proceedings},
2235 author = {Tom{\'a}s Filler and
2237 Jessica J. Fridrich},
2238 title = {Minimizing embedding impact in steganography using trellis-coded
2242 ee = {http://dx.doi.org/10.1117/12.838002},
2243 bibsource = {DBLP, http://dblp.uni-trier.de},
2247 series = {SPIE Proceedings},
2258 @proceedings{DBLP:conf/mediaforensics/2010,
2259 editor = {Nasir D. Memon and
2261 Adnan M. Alattar and
2263 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2264 Electronic Imaging Symposium, San Jose, CA, USA, January
2265 18-20, 2010, Proceedings},
2266 booktitle = {Media Forensics and Security},
2269 series = {SPIE Proceedings},
2272 isbn = {978-0-8194-7934-1},
2273 bibsource = {DBLP, http://dblp.uni-trier.de}
2276 @article{DBLP:journals/corr/abs-1112-5239,
2277 author = {Jacques M. Bahi and
2278 Rapha{\"e}l Couturier and
2279 Christophe Guyeux and
2280 Pierre-Cyrille H{\'e}am},
2281 title = {Efficient and Cryptographically Secure Generation of Chaotic
2282 Pseudorandom Numbers on GPU},
2284 volume = {abs/1112.5239},
2286 ee = {http://arxiv.org/abs/1112.5239},
2287 bibsource = {DBLP, http://dblp.uni-trier.de}
2291 author = {Ponomarenko, Nikolay},
2292 title = {PSNR-HVS-M page},
2293 OPThowpublished = {},
2296 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2302 author = {Bovik, Alan C.},
2303 title = {BIQI page},
2304 OPThowpublished = {},
2307 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2312 @InProceedings{PSECAL07,
2313 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2314 title = {On between-coefficient contrast masking of DCT basis functions},
2315 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2318 editor = {Li,Baoxin},
2324 OPTorganization = {},
2332 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2333 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2334 journal = {IEEE Signal Processing Letters},
2345 @inproceedings{DBLP:conf/crypto/ShubBB82,
2346 author = {Lenore Blum and
2349 title = {Comparison of Two Pseudo-Random Number Generators},
2350 editor = {David Chaum and
2351 Ronald L. Rivest and
2353 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2354 Barbara, California, USA, August 23-25, 1982},
2356 bibsource = {DBLP, http://dblp.uni-trier.de},
2357 publisher = {Plenum Press},
2358 address={New York, NY, USA},
2361 bibsource = {DBLP, http://dblp.uni-trier.de}
2365 @inproceedings{Blum:1985:EPP:19478.19501,
2366 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2367 Barbara, California, USA, August 19-22, 1984, Proceedings},
2368 author = {Manuel Blum and
2370 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2371 Which Hides All Partial Information},
2375 editor = {G. R. Blakley and
2377 publisher = springer,
2378 address = springer_loc,
2385 @article{DBLP:journals/ejisec/FontaineG07,
2386 author = {Caroline Fontaine and
2388 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2389 journal = {EURASIP Journal on Information Security},
2394 ee = {http://dx.doi.org/10.1155/2007/13801},
2395 bibsource = {DBLP, http://dblp.uni-trier.de}
2399 @article{Luo:2010:EAI:1824719.1824720,
2400 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2401 title = {Edge adaptive image steganography based on LSB matching revisited},
2402 journal = {IEEE Transactions on Information Forensics and Security},
2410 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2411 doi = {10.1109/TIFS.2010.2041812},
2413 publisher = {IEEE Press},
2414 address = {Piscataway, NJ, USA},
2415 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2418 @article{Mielikainen06,
2419 author = {Mielikainen, J.},
2420 title = {LSB Matching Revisited},
2421 journal = {IEEE Signal Processing Letters},
2436 @article{Liu:2008:FMP:1284917.1285196,
2437 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2438 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2439 journal = {Pattern Recogn.},
2440 issue_date = {January, 2008},
2448 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2449 doi = {10.1016/j.patcog.2007.06.005},
2451 publisher = {Elsevier Science Inc.},
2452 address = {New York, NY, USA},
2453 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2458 @InProceedings{LHS08,
2459 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2460 title = {Textural features based universal steganalysis},
2463 booktitle = {Proc. SPIE 6819},
2474 OPTorganization = {},
2481 @InProceedings{KF11,
2482 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2483 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2486 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2490 pages = {78800L-78800L-13},
2499 OPTorganization = {},
2505 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2506 author = {Jan Kodovský and
2508 Jessica J. Fridrich},
2509 title = {Modern steganalysis can detect YASS.},
2510 booktitle = {Media Forensics and Security},
2513 ee = {http://dx.doi.org/10.1117/12.838768}
2516 @article{DBLP:journals/tifs/KodovskyFH12,
2517 author = {Jan Kodovsk{\'y} and
2518 Jessica J. Fridrich and
2520 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2521 journal = {IEEE Transactions on Information Forensics and Security},
2526 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2527 bibsource = {DBLP, http://dblp.uni-trier.de}
2532 @article{Fillatre:2012:ASL:2333143.2333587,
2533 author = {Fillatre, Lionel},
2534 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2535 journal = {IEEE Transactions on Signal Processing},
2543 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2544 doi = {10.1109/TSP.2011.2174231},
2546 publisher = {IEEE Press},
2547 address = {Piscataway, NJ, USA},
2551 @inproceedings{Tyan1993,
2552 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2553 address = ieecs_loc,
2555 author = {Tyan, C. Y. and Wang, P. P.},
2556 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2557 citeulike-article-id = {7936501},
2558 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2560 posted-at = {2010-10-01 17:27:48},
2563 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2569 @article{Canny:1986:CAE:11274.11275,
2570 author = {Canny, J},
2571 title = {A Computational Approach to Edge Detection},
2572 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2573 issue_date = {June 1986},
2581 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2582 doi = {10.1109/TPAMI.1986.4767851},
2584 publisher = {IEEE Computer Society},
2585 address = {Washington, DC, USA},
2586 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2590 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2591 author = {Jessica J. Fridrich and
2592 Jan Kodovsk{\'y} and
2595 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2597 booktitle = {Information Hiding},
2600 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2601 crossref = {DBLP:conf/ih/2011},
2602 bibsource = {DBLP, http://dblp.uni-trier.de}
2604 @proceedings{DBLP:conf/ih/2011,
2605 editor = {Tom{\'a}s Filler and
2606 Tom{\'a}s Pevn{\'y} and
2609 title = {Information Hiding - 13th International Conference, IH 2011,
2610 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2612 booktitle = {Information Hiding},
2613 publisher = springer,
2614 address = springer_loc,
2618 isbn = {978-3-642-24177-2},
2619 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2620 bibsource = {DBLP, http://dblp.uni-trier.de}
2623 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2624 author = {Jessica J. Fridrich},
2625 title = {Modern Trends in Steganography and Steganalysis},
2629 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2630 crossref = {DBLP:conf/iwdw/2011},
2631 bibsource = {DBLP, http://dblp.uni-trier.de}
2633 @proceedings{DBLP:conf/iwdw/2011,
2634 editor = {Yun-Qing Shi and
2635 Hyoung-Joong Kim and
2636 Fernando P{\'e}rez-Gonz{\'a}lez},
2637 title = {Digital Forensics and Watermarking - 10th International
2638 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2639 2011, Revised Selected Papers},
2641 publisher = springer,
2642 address = springer_loc,
2646 isbn = {978-3-642-32204-4},
2647 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2648 bibsource = {DBLP, http://dblp.uni-trier.de}
2654 @article{MCErlang07,
2655 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2656 title = {McErlang: a model checker for a distributed functional programming language},
2657 journal = {SIGPLAN Not.},
2666 @inproceedings{Bogor03,
2668 Matthew B. Dwyer and
2670 title = {Bogor: an extensible and highly-modular software model checking
2672 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2673 of Software Engineering 2003},
2681 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2682 title = {On Devaney's Definition of Chaos},
2683 journal = {Amer. Math. Monthly},
2689 timestamp = {27/01/2008}
2692 @article{Crook2007267,
2693 title = "Pattern recall in networks of chaotic neurons",
2694 journal = "Biosystems",
2697 pages = "267 - 274",
2700 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2701 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2703 keywords = "Spiking neural network"
2707 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2708 title = {A novel Hash algorithm construction based on chaotic neural network},
2709 journal = {Neural Computing and Applications},
2712 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2715 keyword = {Computer Science},
2716 publisher = {Springer London}
2720 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2721 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2727 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2728 doi={10.1109/TCE.2004.1309431},
2731 @article{Zhang2005759,
2732 title = "An image encryption approach based on chaotic maps",
2733 journal = "Chaos, Solitons \& Fractals",
2736 pages = "759 - 765",
2740 doi = "10.1016/j.chaos.2004.09.035",
2741 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2744 @article{Lian20091296,
2745 title = "A block cipher based on chaotic neural networks",
2746 journal = "Neurocomputing",
2749 pages = "1296 - 1301",
2752 author = "Shiguo Lian",
2753 keywords = "Neural network",
2755 keywords = "Security",
2756 keywords = "Block cipher",
2757 keywords = "Image encryption"
2761 author = {George Cybenko},
2762 title = {Approximation by Superpositions of a Sigmoidal function},
2763 journal = {Mathematics of Control, Signals and Systems},
2770 @article{DBLP:journals/nn/HornikSW89,
2771 author = {Kurt Hornik and
2772 Maxwell B. Stinchcombe and
2774 title = {Multilayer feedforward networks are universal approximators},
2775 journal = {Neural Networks},
2780 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2781 bibsource = {DBLP, http://dblp.uni-trier.de}
2784 @article{dalkiran10,
2785 author = {Ilker Dalkiran and Kenan Danisman},
2786 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2787 title = {Artificial neural network based chaotic generator for cryptology},
2795 @article{springerlink:10.1007/s00521-010-0432-2,
2796 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2797 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2798 title = {A novel Hash algorithm construction based on chaotic neural network},
2799 journal = {Neural Computing and Applications},
2800 publisher = {Springer},
2802 keyword = {Computer Science},
2808 @article{Feder2009NTB,
2809 author = {Feder, Tom\'{a}s and Subi, Carlos},
2810 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2811 journal = {Inf. Process. Lett.},
2812 issue_date = {February, 2009},
2820 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2821 doi = {10.1016/j.ipl.2008.10.015},
2823 publisher = {Elsevier North-Holland, Inc.},
2824 address = {Amsterdam, The Netherlands, The Netherlands},
2825 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2831 author={Zanten, A.~J.~van and Suparta, I.~N.},
2832 title={ Totally balanced and exponentially balanced Gray codes},
2833 journal={Discrete Analysis and Operational Research},
2841 @book{LevinPeresWilmer2006,
2842 added-at = {2010-01-19T17:51:27.000+0100},
2843 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2844 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2845 interhash = {61354795a6accb6407bfdbf04753a683},
2846 intrahash = {097dc4d1d0e412b2444f540b04110797},
2847 keywords = {markovchains probabilitytheory textbook},
2848 publisher = {American Mathematical Society},
2849 timestamp = {2010-01-19T17:51:27.000+0100},
2850 title = {{Markov chains and mixing times}},
2851 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2856 author = {M. Mitzenmacher and Eli Upfal},
2858 title = {Probability and Computing},
2859 publisher = {Cambridge University Press},
2865 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2868 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2869 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2870 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
2876 @article{Robinson:1981:CS,
2877 author = {Robinson, John P. and Cohn, Martin},
2878 title = {Counting Sequences},
2879 journal = {IEEE Trans. Comput.},
2880 issue_date = {January 1981},
2888 url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
2890 publisher = {IEEE Computer Society},
2891 address = {Washington, DC, USA},
2892 keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
2894 @article{DBLP:journals/combinatorics/BhatS96,
2895 author = {Girish S. Bhat and
2897 title = {Balanced Gray Codes},
2898 journal = {Electr. J. Comb.},
2902 url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
2903 timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
2904 biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
2905 bibsource = {dblp computer science bibliography, http://dblp.org}