1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
7 Michel Salomon, Jacques M Bahi},
8 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
11 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
19 address = {Belfast, UK},
26 @inproceedings{chgw+14:oip,
28 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
30 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
31 title = {Pseudorandom Number Generators with Balanced Gray Codes},
32 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
34 address = {Vienna, Austria},
43 @INPROCEEDINGS{nusmv02,
44 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
45 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
46 Sebastiani and Armando Tacchella},
47 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
51 crossref = {DBLP:conf/cav/2002}
55 author = {Nishanth Chandrasekaran},
56 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
61 Author = "Gastin, P. and Oddoux, D.",
62 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
63 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
64 Publisher = "Springer",
72 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
73 title = {A uniform deductive approach for parameterized protocol safety},
77 bibsource = {DBLP, http://dblp.uni-trier.de},
78 crossref = {DBLP:conf/kbse/2005},
79 ee = {http://doi.acm.org/10.1145/1101908.1101971}
82 @INPROCEEDINGS{abcvs05,
83 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
84 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
86 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
90 address = {Guelph, Canada},
92 note = {ISSN 1492-8760}
96 author = {Bahi, J. M.},
97 title = {Boolean totally asynchronous iterations},
105 author = {Bahi, J. M. and Contassot-Vivier, S.},
106 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
116 author = {Bahi, J. M. and Contassot-Vivier, S.},
117 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
122 pages = {1353--1363},
126 @techreport{BCVC10:ir,
127 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
128 title = {Convergence Results of Combining Synchronism and Asynchronism for
129 Discrete-State Discrete-Time Dynamic Network},
131 institution = {LIFC - Laboratoire d’{I}nformatique de
132 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
133 type = {Research Report},
134 number = {RR2010-02},
135 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
139 @techreport{Cou10:ir,
140 author = {Couchot, J.-F.},
141 title = {Formal {C}onvergence {P}roof for {D}iscrete
142 {D}ynamical {S}ystems},
144 institution = {LIFC - Laboratoire d’{I}nformatique de
145 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
146 type = {Research Report},
147 number = {RR2010-03},
148 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
156 author = {Bahi, J. M. and Michel, C.},
157 title = {Convergence of discrete asynchronous iterations},
158 journal = {International Journal Computer Mathematics},
165 author = {Bahi, J. M. and Michel, C.},
166 title = {Simulations of asynchronous evolution of discrete systems},
167 journal = {Simulation Practice and Theory},
175 author = {G\'{e}rard M. Baudet},
176 title = {Asynchronous Iterative Methods for Multiprocessors},
182 doi = {http://doi.acm.org/10.1145/322063.322067},
188 title = {Parallel and distributed computation: numerical methods},
189 publisher = prenticeHall,
191 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
192 isbn = {0-13-648700-9}
196 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
197 title = {The software model checker Blast},
205 @INPROCEEDINGS{LeCun85,
207 title = {A learning scheme for threshold networks},
208 booktitle = {Cognitiva'95},
211 address = {Paris, France}
215 author = {Jeffrey L. Elman},
216 title = {Finding Structure in Time},
217 journal = {Cognitive Science},
224 author = {Andreas Frommer and Daniel B. Szyld},
225 title = {On asynchronous iterations},
231 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
237 author = {Goles Ch., E. and Salinas,L.},
238 title = {Comparison between parallel and serial dynamics of Boolean networks},
247 title = {The SPIN Model Checker: Primer and Reference Manual},
248 publisher = {Addison-Wesley, Pearson Education},
250 author = {Gerard J. Holzmann}
254 author = {Shih M.-H. and Ho, J.-L.},
255 title = {Solution of the Boolean Markus-Yamabe Problem},
256 journal = advapplMath,
264 author = {Adrien Richard},
265 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
267 journal = advapplMath,
276 author = {Adrien Richard and Jean-Paul Comet},
277 title = {Necessary conditions for multistationarity in discrete dynamical
279 journal = discreteapplMath,
282 pages = {2403--2413},
289 title = {Les syst\`emes dynamiques discrets},
290 publisher = springer,
292 author = {F. Robert},
294 series = {Math\'ematiques et Applications}
298 author = {Shih, M.-H. and Dong J.-L.},
299 title = {A combinatorial analogue of the Jacobian problem in automata networks},
300 journal = advapplMath,
309 author = {Thomas, R.},
310 title = {Boolean Formalization of Genetic Control Circuits},
318 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
319 title = {Absence of Cycles in Symmetric Neural Networks},
325 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
328 @PROCEEDINGS{DBLP:conf/cav/2002,
329 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
330 Denmark, July 27-31, 2002, Proceedings},
332 editor = {Ed Brinksma and Kim Guldstrand Larsen},
335 publisher = springer,
339 @PROCEEDINGS{DBLP:conf/kbse/2005,
340 title = {20th IEEE/ACM International Conference on Automated Software Engineering
341 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
343 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
345 bibsource = {DBLP, http://dblp.uni-trier.de},
350 author = {Ben-Ari, Mordechai},
352 title = {Principles of the Spin Model Checker},
353 isbn = {1846287693, 9781846287695}},
354 publisher = springer,
358 @INPROCEEDINGS{Wei97,
359 author = {Weise,Carsten},
360 title = {An incremental formal semantics for {PROMELA}},
361 booktitle = {SPIN97, the Third SPIN Workshop},
366 @PHDTHESIS{Couchot-PhD06,
367 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
368 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
371 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
372 TYPE = {Th\`ese de {D}octorat},
377 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
378 Page, M. and Tewfik, S. and Geiselmann, J.},
379 title = {Qualitative simulation of genetic regulatory networks
380 using piecewise-linear models},
381 journal = {Bull. Math. Biol.},
393 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
394 title = {A Fruitful Application of Formal Methods to Biological
395 Regulatory Networks: Extending {T}homas' Asynchronous
396 Logical Approach with Temporal Logic},
397 journal = {J. Theor. Biol.},
407 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
408 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
409 journal = {Biosystems},
421 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
423 title = {Genetic Network Analyzer: qualitative simulation
424 of genetic regulatory networks.},
425 journal = {Bioinformatics},
433 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
434 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
435 journal = {Genes, Genomes and Genomics},
447 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
448 title = {Analysing formal models of genetic regulatory networks with delays},
449 journal = {Int. J. Bioinformatics Res. Appl.},
455 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
456 publisher = {Inderscience Publishers},
457 address = {Inderscience Publishers, Geneva, SWITZERLAND},
460 author = {Richard, A.},
461 title = {Local negative circuits and fixed points in Boolean networks},
462 institution = {preprint arXiv number 0910.0750},
475 author = {Remy, R. and Ruet, P. and Thieffry, D.},
476 title = {Graphic requirement for multistability and attractive cycles in a
477 Boolean dynamical framework},
478 journal = {Advances in Applied Mathematics},
484 timestamp = {2009.02.05}
487 @inproceedings{DBLP:conf/icann/BahiCMMS06,
488 author = {Jacques M. Bahi and
489 Sylvain Contassot-Vivier and
493 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
494 in Heterogeneous Environments},
495 booktitle = {ICANN (2)},
498 ee = {http://dx.doi.org/10.1007/11840930_81},
499 crossref = {DBLP:conf/icann/2006-2},
500 bibsource = {DBLP, http://dblp.uni-trier.de}
503 @proceedings{DBLP:conf/icann/2006-2,
504 editor = {Stefanos D. Kollias and
505 Andreas Stafylopatis and
508 title = {Artificial Neural Networks - ICANN 2006, 16th International
509 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
511 booktitle = {ICANN (2)},
512 publisher = {Springer},
513 series = {Lecture Notes in Computer Science},
516 isbn = {3-540-38871-0},
517 bibsource = {DBLP, http://dblp.uni-trier.de}
524 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
526 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
527 publisher = {Eyrolles},
545 title = {An Introduction to Chaotic Dynamical Systems},
546 publisher = {Redwood City: Addison-Wesley},
548 author = {R. L. Devaney},
551 timestamp = {27/01/2008}
555 @inproceedings{bgs11:ip,
557 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
560 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
561 title = {Building a Chaotic Proven Neural Network},
562 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
563 address = {Maldives, Maldives},
569 author = {Bahi, Jacques M. and Guyeux, Christophe},
570 title = {Hash Functions Using Chaotic Iterations},
571 journal = {Journal of Algorithms \& Computational Technology},
576 classement = {ACLNI},
577 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
586 @PHDTHESIS{GuyeuxThese10,
587 author = {Christophe Guyeux},
588 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
589 en s\'{e}curit\'{e} informatique},
590 school = {Universit\'{e} de Franche-Comt\'{e}},
592 owner = {christophe},
593 timestamp = {2010.12.21}
596 @INPROCEEDINGS{gfb10:ip,
597 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
598 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
599 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
600 Multimedia Signal Processing},
603 address = {Darmstadt, Germany},
606 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
613 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
614 title = {Topological entropy},
615 journal = {Transactions of the American Mathematical Society},
620 timestamp = {2008.05.29}
624 author = {Rufus Bowen},
625 title = {Entropy for group endomorphisms and homogeneous spaces},
626 journal = {Transactions of the American Mathematical Society},
631 timestamp = {15/02/2008}
634 @article{10.1109/CIMSiM.2010.36,
635 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
636 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
637 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
641 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
642 publisher = {IEEE Computer Society},
643 address = {Los Alamitos, CA, USA},
645 @article{10.1109/ICME.2003.1221665,
646 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
647 title = {Neural network based steganalysis in still images},
648 journal ={Multimedia and Expo, IEEE International Conference on},
652 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
653 publisher = {IEEE Computer Society},
654 address = {Los Alamitos, CA, USA},
657 @ARTICLE{Sullivan06steganalysisfor,
658 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
659 title = {Steganalysis for Markov cover data with applications to images},
660 journal = {IEEE Transactions on Information Forensics and Security},
669 author = "Gray, Frank",
670 title = "Pulse code communication",
671 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
676 @INPROCEEDINGS{guyeux10ter,
677 author = {Bahi, Jacques M. and Guyeux, Christophe},
678 title = {A new chaos-based watermarking algorithm},
679 booktitle = {SECRYPT'10, International Conference on Security
683 address = {Athens, Greece},
685 publisher = {SciTePress},
687 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
693 @inproceedings{Qiao:2009:SM:1704555.1704664,
694 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
695 title = {Steganalysis of MP3Stego},
696 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
699 location = {Atlanta, Georgia, USA},
700 pages = {2723--2728},
702 publisher = {IEEE Press}
707 @article{byrd1995limited,
708 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
709 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
710 journal = {SIAM J. Sci. Comput.},
711 issue_date = {Sept. 1995},
717 pages = {1190--1208},
719 url = {http://dx.doi.org/10.1137/0916069},
720 doi = {10.1137/0916069},
722 publisher = {Society for Industrial and Applied Mathematics},
723 address = {Philadelphia, PA, USA},
724 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
727 @article{ANU:1770520,
728 author = {Powell,M. J. D.},
729 title = {Direct search algorithms for optimization calculations},
730 journal = {Acta Numerica},
737 doi = {10.1017/S0962492900002841},
738 URL = {http://journals.cambridge.org/article_S0962492900002841},
744 journal={The Journal of Supercomputing},
747 doi={10.1007/s11227-010-0500-5},
748 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
749 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
750 publisher={Springer US},
751 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
752 author={Wang, Honggang},
758 author={Yifeng He and Lee, I. and Ling Guan},
759 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
760 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
765 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
766 doi={10.1109/TCSVT.2009.2017411},
770 author={Palomar, D.P. and Mung Chiang},
771 journal={Selected Areas in Communications, IEEE Journal on},
772 title={A tutorial on decomposition methods for network utility maximization},
777 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
778 doi={10.1109/JSAC.2006.879350},
783 journal={EURASIP Journal on Information Security},
787 doi={10.1186/1687-417X-2014-1},
788 title={Universal distortion function for steganography in an arbitrary domain},
789 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
790 publisher={Springer International Publishing},
791 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
795 @inproceedings{conf/wifs/HolubF12,
796 added-at = {2013-01-23T00:00:00.000+0100},
797 author = {Holub, Vojtech and Fridrich, Jessica J.},
798 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
800 crossref = {conf/wifs/2012},
801 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
802 interhash = {cbef658a6868216eef585dd759ae0668},
803 intrahash = {a685b4b8b521ac99734fb52c064ca994},
804 isbn = {978-1-4673-2285-0},
808 timestamp = {2013-01-23T00:00:00.000+0100},
809 title = {Designing steganographic distortion using directional filters.},
810 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
818 author = {Tom{\'a}s Filler and
820 Jessica J. Fridrich},
821 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
823 journal = {IEEE Transactions on Information Forensics and Security},
828 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
829 bibsource = {DBLP, http://dblp.uni-trier.de}
832 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
833 editor = {Ira S. Moskowitz},
834 author = {Shelby Pereira and
835 Sviatoslav Voloshynovskiy and
837 St{\'e}phane Marchand-Maillet and
839 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
840 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
841 title = {Second Generation Benchmarking and Application Oriented
846 publisher = springer,
847 address = springer_loc,
853 @inproceedings{DBLP:conf/ih/Westfeld01,
854 added-at = {2011-06-28T00:00:00.000+0200},
855 author = {Westfeld, Andreas},
856 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
857 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
858 editor = {Ira S. Moskowitz},
860 publisher = springer,
861 address = springer_loc,
864 title = {F5-A Steganographic Algorithm.},
873 @article{Chang20101286,
874 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
875 journal = "Digital Signal Processing",
878 pages = "1286 - 1307",
882 doi = "10.1016/j.dsp.2009.11.005",
883 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
884 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
885 keywords = "Security",
886 keywords = "Wet paper coding",
887 keywords = "Steganography",
888 keywords = "Indicator",
889 keywords = "Fuzzy edge detector"
894 @article{Hu:2007:HPE:1282866.1282944,
895 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
896 title = {A high performance edge detector based on fuzzy inference rules},
897 journal = {Inf. Sci.},
898 issue_date = {November, 2007},
904 pages = {4768--4784},
906 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
907 doi = {10.1016/j.ins.2007.04.001},
909 publisher = {Elsevier Science Inc.},
910 address = {New York, NY, USA},
911 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
915 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
916 author = {Sorina Dumitrescu and
918 editor = {Ahmet M. Eskicioglu and
919 Jessica J. Fridrich and
921 title = {LSB steganalysis based on high-order statistics},
922 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
923 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
926 address = {New York, NY, USA},
929 ee = {http://doi.acm.org/10.1145/1073170.1073176},
930 bibsource = {DBLP, http://dblp.uni-trier.de}
933 @inproceedings{DBLP:conf/ih/Ker05,
934 author = {Andrew D. Ker},
935 title = {A General Framework for Structural Steganalysis of LSB Replacement},
936 editor = {Mauro Barni and
937 Jordi Herrera-Joancomart\'{\i} and
938 Stefan Katzenbeisser and
939 Fernando P{\'e}rez-Gonz{\'a}lez},
940 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
941 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
944 ee = {http://dx.doi.org/10.1007/11558859_22},
945 publisher = springer,
946 address = springer_loc,
954 editor = {Matthias Kirchner and
956 booktitle = {Information Hiding - 14th International Conference, IH 2012,
957 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
958 author = {Jessica J. Fridrich and
960 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
964 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
966 publisher = springer,
967 address = springer_loc,
969 bibsource = {DBLP, http://dblp.uni-trier.de}
973 @article{DBLP:journals/tsp/DumitrescuWW03,
974 added-at = {2012-02-06T00:00:00.000+0100},
975 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
976 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
977 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
978 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
979 intrahash = {556caad9b61980d3458885153a52321c},
980 journal = {IEEE Transactions on Signal Processing},
984 timestamp = {2012-02-06T00:00:00.000+0100},
985 title = {Detection of LSB steganography via sample pair analysis.},
986 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
994 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
995 editor = {Nicolas D. Georganas and
996 Radu Popescu-Zeletin},
997 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
998 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1000 author = {Jessica J. Fridrich and
1003 title = {Reliable detection of LSB steganography in color and grayscale
1007 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1009 address = {New York, NY, USA},
1011 bibsource = {DBLP, http://dblp.uni-trier.de}
1018 @inproceedings{DBLP:conf/ih/PevnyFB10,
1019 author = {Tom{\'a}s Pevn{\'y} and
1020 Tom{\'a}s Filler and
1022 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1024 editor = {Rainer B{\"o}hme and
1025 Philip W. L. Fong and
1026 Reihaneh Safavi-Naini},
1027 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1028 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1033 publisher = springer,
1034 address = springer_loc,
1037 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1038 bibsource = {DBLP, http://dblp.uni-trier.de}
1047 author = {Tom{\'a}s Pevn{\'y} and
1048 Tom{\'a}s Filler and
1051 title = {Break Our Steganographic System},
1052 OPThowpublished = {},
1055 note = {Available at \url{http://www.agents.cz/boss/}},
1059 @proceedings{DBLP:conf/ih/2010,
1060 editor = {Rainer B{\"o}hme and
1061 Philip W. L. Fong and
1062 Reihaneh Safavi-Naini},
1063 title = {Information Hiding - 12th International Conference, IH 2010,
1064 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1066 booktitle = {Information Hiding},
1067 publisher = springer,
1068 address = springer_loc,
1072 isbn = {978-3-642-16434-7},
1073 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1074 bibsource = {DBLP, http://dblp.uni-trier.de}
1078 @article{DBLP:journals/eswa/ChenCL10,
1079 added-at = {2010-07-21T15:44:10.000+0200},
1080 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1081 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1082 date = {2010-05-03},
1083 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1084 interhash = {bc34a5f04661fee24ee62c39e76361be},
1085 intrahash = {28889a4ab329da28559f0910469f054b},
1086 journal = {Expert Systems with Applications},
1089 pages = {3292-3301},
1090 timestamp = {2010-07-21T15:44:10.000+0200},
1091 title = {High payload steganography mechanism using hybrid edge detector.},
1092 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1097 @article{DBLP:journals/tifs/FillerJF11,
1098 added-at = {2011-09-29T00:00:00.000+0200},
1099 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1100 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1101 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1102 interhash = {b27d23ed0c9936d568e16c51378abccd},
1103 intrahash = {50e43c05a74eec17524b3df8db442da5},
1104 journal = {IEEE Transactions on Information Forensics and Security},
1108 timestamp = {2011-09-29T00:00:00.000+0200},
1109 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1110 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1118 @inproceedings{DBLP:conf/ih/KimDR06,
1119 added-at = {2007-09-20T00:00:00.000+0200},
1120 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1121 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1122 booktitle = {Information Hiding},
1123 crossref = {DBLP:conf/ih/2006},
1124 date = {2007-09-20},
1125 description = {dblp},
1126 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1127 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1128 interhash = {399aab122b39cfd6f6e951a1b276c786},
1129 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1130 isbn = {978-3-540-74123-7},
1134 publisher = springer,
1135 address = springer_loc,
1137 timestamp = {2007-09-20T00:00:00.000+0200},
1138 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1139 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1145 @proceedings{DBLP:conf/ih/2006,
1146 editor = {Jan Camenisch and
1147 Christian S. Collberg and
1150 title = {Information Hiding, 8th International Workshop, IH 2006,
1151 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1152 booktitle = {Information Hiding},
1153 publisher = springer,
1154 address = springer_loc,
1158 isbn = {978-3-540-74123-7},
1159 bibsource = {DBLP, http://dblp.uni-trier.de}
1164 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1165 author = {Jessica J. Fridrich and
1166 Tom{\'a}s Pevn{\'y} and
1168 title = {Statistically undetectable jpeg steganography: dead ends
1169 challenges, and opportunities},
1171 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1172 editor = {Deepa Kundur and
1173 Balakrishnan Prabhakaran and
1175 Jessica J. Fridrich},
1176 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1177 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1179 address = {New York, NY, USA},
1182 isbn = {978-1-59593-857-2},
1183 bibsource = {DBLP, http://dblp.uni-trier.de}
1189 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1190 editor = {Nasir D. Memon and
1192 Adnan M. Alattar and
1194 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1195 Electronic Imaging Symposium, San Jose, CA, USA, January
1196 18-20, 2010, Proceedings},
1197 author = {Tom{\'a}s Filler and
1199 Jessica J. Fridrich},
1200 title = {Minimizing embedding impact in steganography using trellis-coded
1204 ee = {http://dx.doi.org/10.1117/12.838002},
1205 bibsource = {DBLP, http://dblp.uni-trier.de},
1209 series = {SPIE Proceedings},
1220 @proceedings{DBLP:conf/mediaforensics/2010,
1221 editor = {Nasir D. Memon and
1223 Adnan M. Alattar and
1225 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1226 Electronic Imaging Symposium, San Jose, CA, USA, January
1227 18-20, 2010, Proceedings},
1228 booktitle = {Media Forensics and Security},
1231 series = {SPIE Proceedings},
1234 isbn = {978-0-8194-7934-1},
1235 bibsource = {DBLP, http://dblp.uni-trier.de}
1238 @article{DBLP:journals/corr/abs-1112-5239,
1239 author = {Jacques M. Bahi and
1240 Rapha{\"e}l Couturier and
1241 Christophe Guyeux and
1242 Pierre-Cyrille H{\'e}am},
1243 title = {Efficient and Cryptographically Secure Generation of Chaotic
1244 Pseudorandom Numbers on GPU},
1246 volume = {abs/1112.5239},
1248 ee = {http://arxiv.org/abs/1112.5239},
1249 bibsource = {DBLP, http://dblp.uni-trier.de}
1253 author = {Ponomarenko, Nikolay},
1254 title = {PSNR-HVS-M page},
1255 OPThowpublished = {},
1258 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1264 author = {Bovik, Alan C.},
1265 title = {BIQI page},
1266 OPThowpublished = {},
1269 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1274 @InProceedings{PSECAL07,
1275 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1276 title = {On between-coefficient contrast masking of DCT basis functions},
1277 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1280 editor = {Li,Baoxin},
1286 OPTorganization = {},
1294 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1295 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1296 journal = {IEEE Signal Processing Letters},
1307 @inproceedings{DBLP:conf/crypto/ShubBB82,
1308 author = {Lenore Blum and
1311 title = {Comparison of Two Pseudo-Random Number Generators},
1312 editor = {David Chaum and
1313 Ronald L. Rivest and
1315 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1316 Barbara, California, USA, August 23-25, 1982},
1318 bibsource = {DBLP, http://dblp.uni-trier.de},
1319 publisher = {Plenum Press},
1320 address={New York, NY, USA},
1323 bibsource = {DBLP, http://dblp.uni-trier.de}
1327 @inproceedings{Blum:1985:EPP:19478.19501,
1328 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1329 Barbara, California, USA, August 19-22, 1984, Proceedings},
1330 author = {Manuel Blum and
1332 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1333 Which Hides All Partial Information},
1337 editor = {G. R. Blakley and
1339 publisher = springer,
1340 address = springer_loc,
1347 @article{DBLP:journals/ejisec/FontaineG07,
1348 author = {Caroline Fontaine and
1350 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1351 journal = {EURASIP Journal on Information Security},
1356 ee = {http://dx.doi.org/10.1155/2007/13801},
1357 bibsource = {DBLP, http://dblp.uni-trier.de}
1361 @article{Luo:2010:EAI:1824719.1824720,
1362 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1363 title = {Edge adaptive image steganography based on LSB matching revisited},
1364 journal = {IEEE Transactions on Information Forensics and Security},
1372 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1373 doi = {10.1109/TIFS.2010.2041812},
1375 publisher = {IEEE Press},
1376 address = {Piscataway, NJ, USA},
1377 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1380 @article{Mielikainen06,
1381 author = {Mielikainen, J.},
1382 title = {LSB Matching Revisited},
1383 journal = {IEEE Signal Processing Letters},
1398 @article{Liu:2008:FMP:1284917.1285196,
1399 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1400 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1401 journal = {Pattern Recogn.},
1402 issue_date = {January, 2008},
1410 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1411 doi = {10.1016/j.patcog.2007.06.005},
1413 publisher = {Elsevier Science Inc.},
1414 address = {New York, NY, USA},
1415 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1420 @InProceedings{LHS08,
1421 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1422 title = {Textural features based universal steganalysis},
1425 booktitle = {Proc. SPIE 6819},
1436 OPTorganization = {},
1443 @InProceedings{KF11,
1444 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1445 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1448 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1452 pages = {78800L-78800L-13},
1461 OPTorganization = {},
1467 @article{DBLP:journals/tifs/KodovskyFH12,
1468 author = {Jan Kodovsk{\'y} and
1469 Jessica J. Fridrich and
1471 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1472 journal = {IEEE Transactions on Information Forensics and Security},
1477 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1478 bibsource = {DBLP, http://dblp.uni-trier.de}
1483 @article{Fillatre:2012:ASL:2333143.2333587,
1484 author = {Fillatre, Lionel},
1485 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1486 journal = {IEEE Transactions on Signal Processing},
1494 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1495 doi = {10.1109/TSP.2011.2174231},
1497 publisher = {IEEE Press},
1498 address = {Piscataway, NJ, USA},
1502 @inproceedings{Tyan1993,
1503 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1504 address = ieecs_loc,
1506 author = {Tyan, C. Y. and Wang, P. P.},
1507 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1508 citeulike-article-id = {7936501},
1509 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1511 posted-at = {2010-10-01 17:27:48},
1514 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1520 @article{Canny:1986:CAE:11274.11275,
1521 author = {Canny, J},
1522 title = {A Computational Approach to Edge Detection},
1523 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1524 issue_date = {June 1986},
1532 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1533 doi = {10.1109/TPAMI.1986.4767851},
1535 publisher = {IEEE Computer Society},
1536 address = {Washington, DC, USA},
1537 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1541 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1542 author = {Jessica J. Fridrich and
1543 Jan Kodovsk{\'y} and
1546 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1548 booktitle = {Information Hiding},
1551 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1552 crossref = {DBLP:conf/ih/2011},
1553 bibsource = {DBLP, http://dblp.uni-trier.de}
1555 @proceedings{DBLP:conf/ih/2011,
1556 editor = {Tom{\'a}s Filler and
1557 Tom{\'a}s Pevn{\'y} and
1560 title = {Information Hiding - 13th International Conference, IH 2011,
1561 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1563 booktitle = {Information Hiding},
1564 publisher = springer,
1565 address = springer_loc,
1569 isbn = {978-3-642-24177-2},
1570 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1571 bibsource = {DBLP, http://dblp.uni-trier.de}
1574 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1575 author = {Jessica J. Fridrich},
1576 title = {Modern Trends in Steganography and Steganalysis},
1580 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1581 crossref = {DBLP:conf/iwdw/2011},
1582 bibsource = {DBLP, http://dblp.uni-trier.de}
1584 @proceedings{DBLP:conf/iwdw/2011,
1585 editor = {Yun-Qing Shi and
1586 Hyoung-Joong Kim and
1587 Fernando P{\'e}rez-Gonz{\'a}lez},
1588 title = {Digital Forensics and Watermarking - 10th International
1589 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1590 2011, Revised Selected Papers},
1592 publisher = springer,
1593 address = springer_loc,
1597 isbn = {978-3-642-32204-4},
1598 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1599 bibsource = {DBLP, http://dblp.uni-trier.de}
1605 @article{MCErlang07,
1606 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1607 title = {McErlang: a model checker for a distributed functional programming language},
1608 journal = {SIGPLAN Not.},
1617 @inproceedings{Bogor03,
1619 Matthew B. Dwyer and
1621 title = {Bogor: an extensible and highly-modular software model checking
1623 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1624 of Software Engineering 2003},
1632 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1633 title = {On Devaney's Definition of Chaos},
1634 journal = {Amer. Math. Monthly},
1640 timestamp = {27/01/2008}
1643 @article{Crook2007267,
1644 title = "Pattern recall in networks of chaotic neurons",
1645 journal = "Biosystems",
1648 pages = "267 - 274",
1651 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1652 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1654 keywords = "Spiking neural network"
1658 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1659 title = {A novel Hash algorithm construction based on chaotic neural network},
1660 journal = {Neural Computing and Applications},
1663 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1666 keyword = {Computer Science},
1667 publisher = {Springer London}
1671 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1672 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1678 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1679 doi={10.1109/TCE.2004.1309431},
1682 @article{Zhang2005759,
1683 title = "An image encryption approach based on chaotic maps",
1684 journal = "Chaos, Solitons \& Fractals",
1687 pages = "759 - 765",
1691 doi = "10.1016/j.chaos.2004.09.035",
1692 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1695 @article{Lian20091296,
1696 title = "A block cipher based on chaotic neural networks",
1697 journal = "Neurocomputing",
1700 pages = "1296 - 1301",
1703 author = "Shiguo Lian",
1704 keywords = "Neural network",
1706 keywords = "Security",
1707 keywords = "Block cipher",
1708 keywords = "Image encryption"
1712 author = {George Cybenko},
1713 title = {Approximation by Superpositions of a Sigmoidal function},
1714 journal = {Mathematics of Control, Signals and Systems},
1721 @article{DBLP:journals/nn/HornikSW89,
1722 author = {Kurt Hornik and
1723 Maxwell B. Stinchcombe and
1725 title = {Multilayer feedforward networks are universal approximators},
1726 journal = {Neural Networks},
1731 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1732 bibsource = {DBLP, http://dblp.uni-trier.de}
1735 @article{dalkiran10,
1736 author = {Ilker Dalkiran and Kenan Danisman},
1737 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1738 title = {Artificial neural network based chaotic generator for cryptology},
1746 @article{springerlink:10.1007/s00521-010-0432-2,
1747 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1748 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1749 title = {A novel Hash algorithm construction based on chaotic neural network},
1750 journal = {Neural Computing and Applications},
1751 publisher = {Springer},
1753 keyword = {Computer Science},