1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
8 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
9 Michel Salomon, Jacques M Bahi},
10 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
13 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
21 address = {Belfast, UK},
28 @inproceedings{chgw+14:oip,
30 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
32 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
33 title = {Pseudorandom Number Generators with Balanced Gray Codes},
34 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
36 address = {Vienna, Austria},
44 @INPROCEEDINGS{nusmv02,
45 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
46 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
47 Sebastiani and Armando Tacchella},
48 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
52 crossref = {DBLP:conf/cav/2002}
56 author = {Nishanth Chandrasekaran},
57 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
62 Author = "Gastin, P. and Oddoux, D.",
63 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
64 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
65 Publisher = "Springer",
73 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
74 title = {A uniform deductive approach for parameterized protocol safety},
78 bibsource = {DBLP, http://dblp.uni-trier.de},
79 crossref = {DBLP:conf/kbse/2005},
80 ee = {http://doi.acm.org/10.1145/1101908.1101971}
83 @INPROCEEDINGS{abcvs05,
84 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
85 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
87 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
91 address = {Guelph, Canada},
93 note = {ISSN 1492-8760}
97 author = {Bahi, J. M.},
98 title = {Boolean totally asynchronous iterations},
106 author = {Bahi, J. M. and Contassot-Vivier, S.},
107 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
117 author = {Bahi, J. M. and Contassot-Vivier, S.},
118 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
123 pages = {1353--1363},
127 @techreport{BCVC10:ir,
128 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
129 title = {Convergence Results of Combining Synchronism and Asynchronism for
130 Discrete-State Discrete-Time Dynamic Network},
132 institution = {LIFC - Laboratoire d’{I}nformatique de
133 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
134 type = {Research Report},
135 number = {RR2010-02},
136 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
140 @techreport{Cou10:ir,
141 author = {Couchot, J.-F.},
142 title = {Formal {C}onvergence {P}roof for {D}iscrete
143 {D}ynamical {S}ystems},
145 institution = {LIFC - Laboratoire d’{I}nformatique de
146 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
147 type = {Research Report},
148 number = {RR2010-03},
149 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
157 author = {Bahi, J. M. and Michel, C.},
158 title = {Convergence of discrete asynchronous iterations},
159 journal = {International Journal Computer Mathematics},
166 author = {Bahi, J. M. and Michel, C.},
167 title = {Simulations of asynchronous evolution of discrete systems},
168 journal = {Simulation Practice and Theory},
176 author = {G\'{e}rard M. Baudet},
177 title = {Asynchronous Iterative Methods for Multiprocessors},
183 doi = {http://doi.acm.org/10.1145/322063.322067},
189 title = {Parallel and distributed computation: numerical methods},
190 publisher = prenticeHall,
192 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
193 isbn = {0-13-648700-9}
197 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
198 title = {The software model checker Blast},
206 @INPROCEEDINGS{LeCun85,
208 title = {A learning scheme for threshold networks},
209 booktitle = {Cognitiva'95},
212 address = {Paris, France}
216 author = {Jeffrey L. Elman},
217 title = {Finding Structure in Time},
218 journal = {Cognitive Science},
225 author = {Andreas Frommer and Daniel B. Szyld},
226 title = {On asynchronous iterations},
232 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
238 author = {Goles Ch., E. and Salinas,L.},
239 title = {Comparison between parallel and serial dynamics of Boolean networks},
248 title = {The SPIN Model Checker: Primer and Reference Manual},
249 publisher = {Addison-Wesley, Pearson Education},
251 author = {Gerard J. Holzmann}
255 author = {Shih M.-H. and Ho, J.-L.},
256 title = {Solution of the Boolean Markus-Yamabe Problem},
257 journal = advapplMath,
265 author = {Adrien Richard},
266 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
268 journal = advapplMath,
277 author = {Adrien Richard and Jean-Paul Comet},
278 title = {Necessary conditions for multistationarity in discrete dynamical
280 journal = discreteapplMath,
283 pages = {2403--2413},
290 title = {Les syst\`emes dynamiques discrets},
291 publisher = springer,
293 author = {F. Robert},
295 series = {Math\'ematiques et Applications}
299 author = {Shih, M.-H. and Dong J.-L.},
300 title = {A combinatorial analogue of the Jacobian problem in automata networks},
301 journal = advapplMath,
310 author = {Thomas, R.},
311 title = {Boolean Formalization of Genetic Control Circuits},
319 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
320 title = {Absence of Cycles in Symmetric Neural Networks},
326 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
329 @PROCEEDINGS{DBLP:conf/cav/2002,
330 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
331 Denmark, July 27-31, 2002, Proceedings},
333 editor = {Ed Brinksma and Kim Guldstrand Larsen},
336 publisher = springer,
340 @PROCEEDINGS{DBLP:conf/kbse/2005,
341 title = {20th IEEE/ACM International Conference on Automated Software Engineering
342 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
344 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
346 bibsource = {DBLP, http://dblp.uni-trier.de},
351 author = {Ben-Ari, Mordechai},
353 title = {Principles of the Spin Model Checker},
354 isbn = {1846287693, 9781846287695}},
355 publisher = springer,
359 @INPROCEEDINGS{Wei97,
360 author = {Weise,Carsten},
361 title = {An incremental formal semantics for {PROMELA}},
362 booktitle = {SPIN97, the Third SPIN Workshop},
367 @PHDTHESIS{Couchot-PhD06,
368 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
369 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
372 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
373 TYPE = {Th\`ese de {D}octorat},
378 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
379 Page, M. and Tewfik, S. and Geiselmann, J.},
380 title = {Qualitative simulation of genetic regulatory networks
381 using piecewise-linear models},
382 journal = {Bull. Math. Biol.},
394 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
395 title = {A Fruitful Application of Formal Methods to Biological
396 Regulatory Networks: Extending {T}homas' Asynchronous
397 Logical Approach with Temporal Logic},
398 journal = {J. Theor. Biol.},
408 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
409 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
410 journal = {Biosystems},
422 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
424 title = {Genetic Network Analyzer: qualitative simulation
425 of genetic regulatory networks.},
426 journal = {Bioinformatics},
434 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
435 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
436 journal = {Genes, Genomes and Genomics},
448 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
449 title = {Analysing formal models of genetic regulatory networks with delays},
450 journal = {Int. J. Bioinformatics Res. Appl.},
456 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
457 publisher = {Inderscience Publishers},
458 address = {Inderscience Publishers, Geneva, SWITZERLAND},
461 author = {Richard, A.},
462 title = {Local negative circuits and fixed points in Boolean networks},
463 institution = {preprint arXiv number 0910.0750},
476 author = {Remy, R. and Ruet, P. and Thieffry, D.},
477 title = {Graphic requirement for multistability and attractive cycles in a
478 Boolean dynamical framework},
479 journal = {Advances in Applied Mathematics},
485 timestamp = {2009.02.05}
488 @inproceedings{DBLP:conf/icann/BahiCMMS06,
489 author = {Jacques M. Bahi and
490 Sylvain Contassot-Vivier and
494 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
495 in Heterogeneous Environments},
496 booktitle = {ICANN (2)},
499 ee = {http://dx.doi.org/10.1007/11840930_81},
500 crossref = {DBLP:conf/icann/2006-2},
501 bibsource = {DBLP, http://dblp.uni-trier.de}
504 @proceedings{DBLP:conf/icann/2006-2,
505 editor = {Stefanos D. Kollias and
506 Andreas Stafylopatis and
509 title = {Artificial Neural Networks - ICANN 2006, 16th International
510 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
512 booktitle = {ICANN (2)},
513 publisher = {Springer},
514 series = {Lecture Notes in Computer Science},
517 isbn = {3-540-38871-0},
518 bibsource = {DBLP, http://dblp.uni-trier.de}
525 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
527 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
528 publisher = {Eyrolles},
546 title = {An Introduction to Chaotic Dynamical Systems},
547 publisher = {Redwood City: Addison-Wesley},
549 author = {R. L. Devaney},
552 timestamp = {27/01/2008}
557 @article{byrd1995limited,
558 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
559 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
560 journal = {SIAM J. Sci. Comput.},
561 issue_date = {Sept. 1995},
567 pages = {1190--1208},
569 url = {http://dx.doi.org/10.1137/0916069},
570 doi = {10.1137/0916069},
572 publisher = {Society for Industrial and Applied Mathematics},
573 address = {Philadelphia, PA, USA},
574 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
577 @article{ANU:1770520,
578 author = {Powell,M. J. D.},
579 title = {Direct search algorithms for optimization calculations},
580 journal = {Acta Numerica},
587 doi = {10.1017/S0962492900002841},
588 URL = {http://journals.cambridge.org/article_S0962492900002841},
594 journal={The Journal of Supercomputing},
597 doi={10.1007/s11227-010-0500-5},
598 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
599 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
600 publisher={Springer US},
601 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
602 author={Wang, Honggang},
608 author={Yifeng He and Lee, I. and Ling Guan},
609 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
610 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
615 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
616 doi={10.1109/TCSVT.2009.2017411},
620 author={Palomar, D.P. and Mung Chiang},
621 journal={Selected Areas in Communications, IEEE Journal on},
622 title={A tutorial on decomposition methods for network utility maximization},
627 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
628 doi={10.1109/JSAC.2006.879350},
633 journal={EURASIP Journal on Information Security},
637 doi={10.1186/1687-417X-2014-1},
638 title={Universal distortion function for steganography in an arbitrary domain},
639 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
640 publisher={Springer International Publishing},
641 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
645 @inproceedings{conf/wifs/HolubF12,
646 added-at = {2013-01-23T00:00:00.000+0100},
647 author = {Holub, Vojtech and Fridrich, Jessica J.},
648 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
650 crossref = {conf/wifs/2012},
651 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
652 interhash = {cbef658a6868216eef585dd759ae0668},
653 intrahash = {a685b4b8b521ac99734fb52c064ca994},
654 isbn = {978-1-4673-2285-0},
658 timestamp = {2013-01-23T00:00:00.000+0100},
659 title = {Designing steganographic distortion using directional filters.},
660 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
668 author = {Tom{\'a}s Filler and
670 Jessica J. Fridrich},
671 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
673 journal = {IEEE Transactions on Information Forensics and Security},
678 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
679 bibsource = {DBLP, http://dblp.uni-trier.de}
682 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
683 editor = {Ira S. Moskowitz},
684 author = {Shelby Pereira and
685 Sviatoslav Voloshynovskiy and
687 St{\'e}phane Marchand-Maillet and
689 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
690 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
691 title = {Second Generation Benchmarking and Application Oriented
696 publisher = springer,
697 address = springer_loc,
703 @inproceedings{DBLP:conf/ih/Westfeld01,
704 added-at = {2011-06-28T00:00:00.000+0200},
705 author = {Westfeld, Andreas},
706 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
707 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
708 editor = {Ira S. Moskowitz},
710 publisher = springer,
711 address = springer_loc,
714 title = {F5-A Steganographic Algorithm.},
723 @article{Chang20101286,
724 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
725 journal = "Digital Signal Processing",
728 pages = "1286 - 1307",
732 doi = "10.1016/j.dsp.2009.11.005",
733 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
734 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
735 keywords = "Security",
736 keywords = "Wet paper coding",
737 keywords = "Steganography",
738 keywords = "Indicator",
739 keywords = "Fuzzy edge detector"
744 @article{Hu:2007:HPE:1282866.1282944,
745 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
746 title = {A high performance edge detector based on fuzzy inference rules},
747 journal = {Inf. Sci.},
748 issue_date = {November, 2007},
754 pages = {4768--4784},
756 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
757 doi = {10.1016/j.ins.2007.04.001},
759 publisher = {Elsevier Science Inc.},
760 address = {New York, NY, USA},
761 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
765 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
766 author = {Sorina Dumitrescu and
768 editor = {Ahmet M. Eskicioglu and
769 Jessica J. Fridrich and
771 title = {LSB steganalysis based on high-order statistics},
772 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
773 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
776 address = {New York, NY, USA},
779 ee = {http://doi.acm.org/10.1145/1073170.1073176},
780 bibsource = {DBLP, http://dblp.uni-trier.de}
783 @inproceedings{DBLP:conf/ih/Ker05,
784 author = {Andrew D. Ker},
785 title = {A General Framework for Structural Steganalysis of LSB Replacement},
786 editor = {Mauro Barni and
787 Jordi Herrera-Joancomart\'{\i} and
788 Stefan Katzenbeisser and
789 Fernando P{\'e}rez-Gonz{\'a}lez},
790 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
791 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
794 ee = {http://dx.doi.org/10.1007/11558859_22},
795 publisher = springer,
796 address = springer_loc,
804 editor = {Matthias Kirchner and
806 booktitle = {Information Hiding - 14th International Conference, IH 2012,
807 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
808 author = {Jessica J. Fridrich and
810 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
814 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
816 publisher = springer,
817 address = springer_loc,
819 bibsource = {DBLP, http://dblp.uni-trier.de}
823 @article{DBLP:journals/tsp/DumitrescuWW03,
824 added-at = {2012-02-06T00:00:00.000+0100},
825 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
826 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
827 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
828 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
829 intrahash = {556caad9b61980d3458885153a52321c},
830 journal = {IEEE Transactions on Signal Processing},
834 timestamp = {2012-02-06T00:00:00.000+0100},
835 title = {Detection of LSB steganography via sample pair analysis.},
836 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
844 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
845 editor = {Nicolas D. Georganas and
846 Radu Popescu-Zeletin},
847 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
848 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
850 author = {Jessica J. Fridrich and
853 title = {Reliable detection of LSB steganography in color and grayscale
857 ee = {http://doi.acm.org/10.1145/1232454.1232466},
859 address = {New York, NY, USA},
861 bibsource = {DBLP, http://dblp.uni-trier.de}
868 @inproceedings{DBLP:conf/ih/PevnyFB10,
869 author = {Tom{\'a}s Pevn{\'y} and
872 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
874 editor = {Rainer B{\"o}hme and
875 Philip W. L. Fong and
876 Reihaneh Safavi-Naini},
877 booktitle = {Information Hiding - 12th International Conference, IH 2010,
878 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
883 publisher = springer,
884 address = springer_loc,
887 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
888 bibsource = {DBLP, http://dblp.uni-trier.de}
897 author = {Tom{\'a}s Pevn{\'y} and
901 title = {Break Our Steganographic System},
902 OPThowpublished = {},
905 note = {Available at \url{http://www.agents.cz/boss/}},
909 @proceedings{DBLP:conf/ih/2010,
910 editor = {Rainer B{\"o}hme and
911 Philip W. L. Fong and
912 Reihaneh Safavi-Naini},
913 title = {Information Hiding - 12th International Conference, IH 2010,
914 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
916 booktitle = {Information Hiding},
917 publisher = springer,
918 address = springer_loc,
922 isbn = {978-3-642-16434-7},
923 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
924 bibsource = {DBLP, http://dblp.uni-trier.de}
928 @article{DBLP:journals/eswa/ChenCL10,
929 added-at = {2010-07-21T15:44:10.000+0200},
930 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
931 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
933 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
934 interhash = {bc34a5f04661fee24ee62c39e76361be},
935 intrahash = {28889a4ab329da28559f0910469f054b},
936 journal = {Expert Systems with Applications},
940 timestamp = {2010-07-21T15:44:10.000+0200},
941 title = {High payload steganography mechanism using hybrid edge detector.},
942 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
947 @article{DBLP:journals/tifs/FillerJF11,
948 added-at = {2011-09-29T00:00:00.000+0200},
949 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
950 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
951 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
952 interhash = {b27d23ed0c9936d568e16c51378abccd},
953 intrahash = {50e43c05a74eec17524b3df8db442da5},
954 journal = {IEEE Transactions on Information Forensics and Security},
958 timestamp = {2011-09-29T00:00:00.000+0200},
959 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
960 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
968 @inproceedings{DBLP:conf/ih/KimDR06,
969 added-at = {2007-09-20T00:00:00.000+0200},
970 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
971 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
972 booktitle = {Information Hiding},
973 crossref = {DBLP:conf/ih/2006},
975 description = {dblp},
976 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
977 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
978 interhash = {399aab122b39cfd6f6e951a1b276c786},
979 intrahash = {f0324f70d62d9dfba568e393920aaa16},
980 isbn = {978-3-540-74123-7},
984 publisher = springer,
985 address = springer_loc,
987 timestamp = {2007-09-20T00:00:00.000+0200},
988 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
989 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
995 @proceedings{DBLP:conf/ih/2006,
996 editor = {Jan Camenisch and
997 Christian S. Collberg and
1000 title = {Information Hiding, 8th International Workshop, IH 2006,
1001 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1002 booktitle = {Information Hiding},
1003 publisher = springer,
1004 address = springer_loc,
1008 isbn = {978-3-540-74123-7},
1009 bibsource = {DBLP, http://dblp.uni-trier.de}
1014 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1015 author = {Jessica J. Fridrich and
1016 Tom{\'a}s Pevn{\'y} and
1018 title = {Statistically undetectable jpeg steganography: dead ends
1019 challenges, and opportunities},
1021 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1022 editor = {Deepa Kundur and
1023 Balakrishnan Prabhakaran and
1025 Jessica J. Fridrich},
1026 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1027 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1029 address = {New York, NY, USA},
1032 isbn = {978-1-59593-857-2},
1033 bibsource = {DBLP, http://dblp.uni-trier.de}
1039 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1040 editor = {Nasir D. Memon and
1042 Adnan M. Alattar and
1044 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1045 Electronic Imaging Symposium, San Jose, CA, USA, January
1046 18-20, 2010, Proceedings},
1047 author = {Tom{\'a}s Filler and
1049 Jessica J. Fridrich},
1050 title = {Minimizing embedding impact in steganography using trellis-coded
1054 ee = {http://dx.doi.org/10.1117/12.838002},
1055 bibsource = {DBLP, http://dblp.uni-trier.de},
1059 series = {SPIE Proceedings},
1070 @proceedings{DBLP:conf/mediaforensics/2010,
1071 editor = {Nasir D. Memon and
1073 Adnan M. Alattar and
1075 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1076 Electronic Imaging Symposium, San Jose, CA, USA, January
1077 18-20, 2010, Proceedings},
1078 booktitle = {Media Forensics and Security},
1081 series = {SPIE Proceedings},
1084 isbn = {978-0-8194-7934-1},
1085 bibsource = {DBLP, http://dblp.uni-trier.de}
1088 @article{DBLP:journals/corr/abs-1112-5239,
1089 author = {Jacques M. Bahi and
1090 Rapha{\"e}l Couturier and
1091 Christophe Guyeux and
1092 Pierre-Cyrille H{\'e}am},
1093 title = {Efficient and Cryptographically Secure Generation of Chaotic
1094 Pseudorandom Numbers on GPU},
1096 volume = {abs/1112.5239},
1098 ee = {http://arxiv.org/abs/1112.5239},
1099 bibsource = {DBLP, http://dblp.uni-trier.de}
1103 author = {Ponomarenko, Nikolay},
1104 title = {PSNR-HVS-M page},
1105 OPThowpublished = {},
1108 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1114 author = {Bovik, Alan C.},
1115 title = {BIQI page},
1116 OPThowpublished = {},
1119 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1124 @InProceedings{PSECAL07,
1125 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1126 title = {On between-coefficient contrast masking of DCT basis functions},
1127 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1130 editor = {Li,Baoxin},
1136 OPTorganization = {},
1144 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1145 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1146 journal = {IEEE Signal Processing Letters},
1157 @inproceedings{DBLP:conf/crypto/ShubBB82,
1158 author = {Lenore Blum and
1161 title = {Comparison of Two Pseudo-Random Number Generators},
1162 editor = {David Chaum and
1163 Ronald L. Rivest and
1165 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1166 Barbara, California, USA, August 23-25, 1982},
1168 bibsource = {DBLP, http://dblp.uni-trier.de},
1169 publisher = {Plenum Press},
1170 address={New York, NY, USA},
1173 bibsource = {DBLP, http://dblp.uni-trier.de}
1177 @inproceedings{Blum:1985:EPP:19478.19501,
1178 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1179 Barbara, California, USA, August 19-22, 1984, Proceedings},
1180 author = {Manuel Blum and
1182 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1183 Which Hides All Partial Information},
1187 editor = {G. R. Blakley and
1189 publisher = springer,
1190 address = springer_loc,
1197 @article{DBLP:journals/ejisec/FontaineG07,
1198 author = {Caroline Fontaine and
1200 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1201 journal = {EURASIP Journal on Information Security},
1206 ee = {http://dx.doi.org/10.1155/2007/13801},
1207 bibsource = {DBLP, http://dblp.uni-trier.de}
1211 @article{Luo:2010:EAI:1824719.1824720,
1212 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1213 title = {Edge adaptive image steganography based on LSB matching revisited},
1214 journal = {IEEE Transactions on Information Forensics and Security},
1222 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1223 doi = {10.1109/TIFS.2010.2041812},
1225 publisher = {IEEE Press},
1226 address = {Piscataway, NJ, USA},
1227 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1230 @article{Mielikainen06,
1231 author = {Mielikainen, J.},
1232 title = {LSB Matching Revisited},
1233 journal = {IEEE Signal Processing Letters},
1248 @article{Liu:2008:FMP:1284917.1285196,
1249 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1250 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1251 journal = {Pattern Recogn.},
1252 issue_date = {January, 2008},
1260 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1261 doi = {10.1016/j.patcog.2007.06.005},
1263 publisher = {Elsevier Science Inc.},
1264 address = {New York, NY, USA},
1265 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1270 @InProceedings{LHS08,
1271 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1272 title = {Textural features based universal steganalysis},
1275 booktitle = {Proc. SPIE 6819},
1286 OPTorganization = {},
1293 @InProceedings{KF11,
1294 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1295 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1298 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1302 pages = {78800L-78800L-13},
1311 OPTorganization = {},
1317 @article{DBLP:journals/tifs/KodovskyFH12,
1318 author = {Jan Kodovsk{\'y} and
1319 Jessica J. Fridrich and
1321 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1322 journal = {IEEE Transactions on Information Forensics and Security},
1327 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1328 bibsource = {DBLP, http://dblp.uni-trier.de}
1333 @article{Fillatre:2012:ASL:2333143.2333587,
1334 author = {Fillatre, Lionel},
1335 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1336 journal = {IEEE Transactions on Signal Processing},
1344 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1345 doi = {10.1109/TSP.2011.2174231},
1347 publisher = {IEEE Press},
1348 address = {Piscataway, NJ, USA},
1352 @inproceedings{Tyan1993,
1353 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1354 address = ieecs_loc,
1356 author = {Tyan, C. Y. and Wang, P. P.},
1357 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1358 citeulike-article-id = {7936501},
1359 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1361 posted-at = {2010-10-01 17:27:48},
1364 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1370 @article{Canny:1986:CAE:11274.11275,
1371 author = {Canny, J},
1372 title = {A Computational Approach to Edge Detection},
1373 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1374 issue_date = {June 1986},
1382 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1383 doi = {10.1109/TPAMI.1986.4767851},
1385 publisher = {IEEE Computer Society},
1386 address = {Washington, DC, USA},
1387 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1391 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1392 author = {Jessica J. Fridrich and
1393 Jan Kodovsk{\'y} and
1396 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1398 booktitle = {Information Hiding},
1401 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1402 crossref = {DBLP:conf/ih/2011},
1403 bibsource = {DBLP, http://dblp.uni-trier.de}
1405 @proceedings{DBLP:conf/ih/2011,
1406 editor = {Tom{\'a}s Filler and
1407 Tom{\'a}s Pevn{\'y} and
1410 title = {Information Hiding - 13th International Conference, IH 2011,
1411 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1413 booktitle = {Information Hiding},
1414 publisher = springer,
1415 address = springer_loc,
1419 isbn = {978-3-642-24177-2},
1420 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1421 bibsource = {DBLP, http://dblp.uni-trier.de}
1424 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1425 author = {Jessica J. Fridrich},
1426 title = {Modern Trends in Steganography and Steganalysis},
1430 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1431 crossref = {DBLP:conf/iwdw/2011},
1432 bibsource = {DBLP, http://dblp.uni-trier.de}
1434 @proceedings{DBLP:conf/iwdw/2011,
1435 editor = {Yun-Qing Shi and
1436 Hyoung-Joong Kim and
1437 Fernando P{\'e}rez-Gonz{\'a}lez},
1438 title = {Digital Forensics and Watermarking - 10th International
1439 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1440 2011, Revised Selected Papers},
1442 publisher = springer,
1443 address = springer_loc,
1447 isbn = {978-3-642-32204-4},
1448 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1449 bibsource = {DBLP, http://dblp.uni-trier.de}