1 c% This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Fredlund, Lars-\AAke and Svensson, Hans},
7 title = {McErlang: a model checker for a distributed functional programming language},
8 journal = {SIGPLAN Not.},
17 @inproceedings{Bogor03,
21 title = {Bogor: an extensible and highly-modular software model checking
23 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
24 of Software Engineering 2003},
30 @INPROCEEDINGS{nusmv02,
31 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
32 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
33 Sebastiani and Armando Tacchella},
34 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
38 crossref = {DBLP:conf/cav/2002}
42 author = {Nishanth Chandrasekaran},
43 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
48 Author = "Gastin, P. and Oddoux, D.",
49 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
50 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
51 Publisher = "Springer",
59 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
60 title = {A uniform deductive approach for parameterized protocol safety},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/kbse/2005},
66 ee = {http://doi.acm.org/10.1145/1101908.1101971}
69 @INPROCEEDINGS{abcvs05,
70 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
71 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
73 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
77 address = {Guelph, Canada},
79 note = {ISSN 1492-8760}
83 author = {Bahi, J. M.},
84 title = {Boolean totally asynchronous iterations},
92 author = {Bahi, J. M. and Contassot-Vivier, S.},
93 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
103 author = {Bahi, J. M. and Contassot-Vivier, S.},
104 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
109 pages = {1353--1363},
113 @techreport{BCVC10:ir,
114 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
115 title = {Convergence Results of Combining Synchronism and Asynchronism for
116 Discrete-State Discrete-Time Dynamic Network},
118 institution = {LIFC - Laboratoire d’{I}nformatique de
119 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
120 type = {Research Report},
121 number = {RR2010-02},
122 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
126 @techreport{Cou10:ir,
127 author = {Couchot, J.-F.},
128 title = {Formal {C}onvergence {P}roof for {D}iscrete
129 {D}ynamical {S}ystems},
131 institution = {LIFC - Laboratoire d’{I}nformatique de
132 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
133 type = {Research Report},
134 number = {RR2010-03},
135 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
143 author = {Bahi, J. M. and Michel, C.},
144 title = {Convergence of discrete asynchronous iterations},
145 journal = {International Journal Computer Mathematics},
152 author = {Bahi, J. M. and Michel, C.},
153 title = {Simulations of asynchronous evolution of discrete systems},
154 journal = {Simulation Practice and Theory},
162 author = {G\'{e}rard M. Baudet},
163 title = {Asynchronous Iterative Methods for Multiprocessors},
169 doi = {http://doi.acm.org/10.1145/322063.322067},
175 title = {Parallel and distributed computation: numerical methods},
176 publisher = prenticeHall,
178 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
179 isbn = {0-13-648700-9}
183 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
184 title = {The software model checker Blast},
192 @INPROCEEDINGS{LeCun85,
194 title = {A learning scheme for threshold networks},
195 booktitle = {Cognitiva'95},
198 address = {Paris, France}
202 author = {Jeffrey L. Elman},
203 title = {Finding Structure in Time},
204 journal = {Cognitive Science},
211 author = {Andreas Frommer and Daniel B. Szyld},
212 title = {On asynchronous iterations},
218 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
224 author = {Goles Ch., E. and Salinas,L.},
225 title = {Comparison between parallel and serial dynamics of Boolean networks},
234 title = {The SPIN Model Checker: Primer and Reference Manual},
235 publisher = {Addison-Wesley, Pearson Education},
237 author = {Gerard J. Holzmann}
241 author = {Shih M.-H. and Ho, J.-L.},
242 title = {Solution of the Boolean Markus-Yamabe Problem},
243 journal = advapplMath,
251 author = {Adrien Richard},
252 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
254 journal = advapplMath,
263 author = {Adrien Richard and Jean-Paul Comet},
264 title = {Necessary conditions for multistationarity in discrete dynamical
266 journal = discreteapplMath,
269 pages = {2403--2413},
276 title = {Les syst\`emes dynamiques discrets},
277 publisher = springer,
279 author = {F. Robert},
281 series = {Math\'ematiques et Applications}
285 author = {Shih, M.-H. and Dong J.-L.},
286 title = {A combinatorial analogue of the Jacobian problem in automata networks},
287 journal = advapplMath,
296 author = {Thomas, R.},
297 title = {Boolean Formalization of Genetic Control Circuits},
305 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
306 title = {Absence of Cycles in Symmetric Neural Networks},
312 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
315 @PROCEEDINGS{DBLP:conf/cav/2002,
316 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
317 Denmark, July 27-31, 2002, Proceedings},
319 editor = {Ed Brinksma and Kim Guldstrand Larsen},
322 publisher = springer,
326 @PROCEEDINGS{DBLP:conf/kbse/2005,
327 title = {20th IEEE/ACM International Conference on Automated Software Engineering
328 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
330 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
332 bibsource = {DBLP, http://dblp.uni-trier.de},
337 author = {Ben-Ari, Mordechai},
339 title = {Principles of the Spin Model Checker},
340 isbn = {1846287693, 9781846287695}},
341 publisher = springer,
345 @INPROCEEDINGS{Wei97,
346 author = {Weise,Carsten},
347 title = {An incremental formal semantics for {PROMELA}},
348 booktitle = {SPIN97, the Third SPIN Workshop},
353 @PHDTHESIS{Couchot-PhD06,
354 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
355 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
358 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
359 TYPE = {Th\`ese de {D}octorat},
364 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
365 Page, M. and Tewfik, S. and Geiselmann, J.},
366 title = {Qualitative simulation of genetic regulatory networks
367 using piecewise-linear models},
368 journal = {Bull. Math. Biol.},
380 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
381 title = {A Fruitful Application of Formal Methods to Biological
382 Regulatory Networks: Extending {T}homas' Asynchronous
383 Logical Approach with Temporal Logic},
384 journal = {J. Theor. Biol.},
394 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
395 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
396 journal = {Biosystems},
408 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
410 title = {Genetic Network Analyzer: qualitative simulation
411 of genetic regulatory networks.},
412 journal = {Bioinformatics},
420 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
421 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
422 journal = {Genes, Genomes and Genomics},
434 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
435 title = {Analysing formal models of genetic regulatory networks with delays},
436 journal = {Int. J. Bioinformatics Res. Appl.},
442 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
443 publisher = {Inderscience Publishers},
444 address = {Inderscience Publishers, Geneva, SWITZERLAND},
447 author = {Richard, A.},
448 title = {Local negative circuits and fixed points in Boolean networks},
449 institution = {preprint arXiv number 0910.0750},
462 author = {Remy, R. and Ruet, P. and Thieffry, D.},
463 title = {Graphic requirement for multistability and attractive cycles in a
464 Boolean dynamical framework},
465 journal = {Advances in Applied Mathematics},
471 timestamp = {2009.02.05}
474 @inproceedings{DBLP:conf/icann/BahiCMMS06,
475 author = {Jacques M. Bahi and
476 Sylvain Contassot-Vivier and
480 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
481 in Heterogeneous Environments},
482 booktitle = {ICANN (2)},
485 ee = {http://dx.doi.org/10.1007/11840930_81},
486 crossref = {DBLP:conf/icann/2006-2},
487 bibsource = {DBLP, http://dblp.uni-trier.de}
490 @proceedings{DBLP:conf/icann/2006-2,
491 editor = {Stefanos D. Kollias and
492 Andreas Stafylopatis and
495 title = {Artificial Neural Networks - ICANN 2006, 16th International
496 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
498 booktitle = {ICANN (2)},
499 publisher = {Springer},
500 series = {Lecture Notes in Computer Science},
503 isbn = {3-540-38871-0},
504 bibsource = {DBLP, http://dblp.uni-trier.de}
511 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
513 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
514 publisher = {Eyrolles},
532 title = {An Introduction to Chaotic Dynamical Systems},
533 publisher = {Redwood City: Addison-Wesley},
535 author = {R. L. Devaney},
538 timestamp = {27/01/2008}
543 @article{byrd1995limited,
544 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
545 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
546 journal = {SIAM J. Sci. Comput.},
547 issue_date = {Sept. 1995},
553 pages = {1190--1208},
555 url = {http://dx.doi.org/10.1137/0916069},
556 doi = {10.1137/0916069},
558 publisher = {Society for Industrial and Applied Mathematics},
559 address = {Philadelphia, PA, USA},
560 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
563 @article{ANU:1770520,
564 author = {Powell,M. J. D.},
565 title = {Direct search algorithms for optimization calculations},
566 journal = {Acta Numerica},
573 doi = {10.1017/S0962492900002841},
574 URL = {http://journals.cambridge.org/article_S0962492900002841},
580 author={Yifeng He and Lee, I. and Ling Guan},
581 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
582 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
587 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
588 doi={10.1109/TCSVT.2009.2017411},
592 author={Palomar, D.P. and Mung Chiang},
593 journal={Selected Areas in Communications, IEEE Journal on},
594 title={A tutorial on decomposition methods for network utility maximization},
599 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
600 doi={10.1109/JSAC.2006.879350},
605 journal={EURASIP Journal on Information Security},
609 doi={10.1186/1687-417X-2014-1},
610 title={Universal distortion function for steganography in an arbitrary domain},
611 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
612 publisher={Springer International Publishing},
613 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
617 @inproceedings{conf/wifs/HolubF12,
618 added-at = {2013-01-23T00:00:00.000+0100},
619 author = {Holub, Vojtech and Fridrich, Jessica J.},
620 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
622 crossref = {conf/wifs/2012},
623 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
624 interhash = {cbef658a6868216eef585dd759ae0668},
625 intrahash = {a685b4b8b521ac99734fb52c064ca994},
626 isbn = {978-1-4673-2285-0},
630 timestamp = {2013-01-23T00:00:00.000+0100},
631 title = {Designing steganographic distortion using directional filters.},
632 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
640 author = {Tom{\'a}s Filler and
642 Jessica J. Fridrich},
643 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
645 journal = {IEEE Transactions on Information Forensics and Security},
650 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
651 bibsource = {DBLP, http://dblp.uni-trier.de}
654 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
655 editor = {Ira S. Moskowitz},
656 author = {Shelby Pereira and
657 Sviatoslav Voloshynovskiy and
659 St{\'e}phane Marchand-Maillet and
661 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
662 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
663 title = {Second Generation Benchmarking and Application Oriented
668 publisher = springer,
669 address = springer_loc,
675 @inproceedings{DBLP:conf/ih/Westfeld01,
676 added-at = {2011-06-28T00:00:00.000+0200},
677 author = {Westfeld, Andreas},
678 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
679 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
680 editor = {Ira S. Moskowitz},
682 publisher = springer,
683 address = springer_loc,
686 title = {F5-A Steganographic Algorithm.},
695 @article{Chang20101286,
696 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
697 journal = "Digital Signal Processing",
700 pages = "1286 - 1307",
704 doi = "10.1016/j.dsp.2009.11.005",
705 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
706 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
707 keywords = "Security",
708 keywords = "Wet paper coding",
709 keywords = "Steganography",
710 keywords = "Indicator",
711 keywords = "Fuzzy edge detector"
716 @article{Hu:2007:HPE:1282866.1282944,
717 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
718 title = {A high performance edge detector based on fuzzy inference rules},
719 journal = {Inf. Sci.},
720 issue_date = {November, 2007},
726 pages = {4768--4784},
728 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
729 doi = {10.1016/j.ins.2007.04.001},
731 publisher = {Elsevier Science Inc.},
732 address = {New York, NY, USA},
733 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
737 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
738 author = {Sorina Dumitrescu and
740 editor = {Ahmet M. Eskicioglu and
741 Jessica J. Fridrich and
743 title = {LSB steganalysis based on high-order statistics},
744 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
745 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
748 address = {New York, NY, USA},
751 ee = {http://doi.acm.org/10.1145/1073170.1073176},
752 bibsource = {DBLP, http://dblp.uni-trier.de}
755 @inproceedings{DBLP:conf/ih/Ker05,
756 author = {Andrew D. Ker},
757 title = {A General Framework for Structural Steganalysis of LSB Replacement},
758 editor = {Mauro Barni and
759 Jordi Herrera-Joancomart\'{\i} and
760 Stefan Katzenbeisser and
761 Fernando P{\'e}rez-Gonz{\'a}lez},
762 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
763 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
766 ee = {http://dx.doi.org/10.1007/11558859_22},
767 publisher = springer,
768 address = springer_loc,
776 editor = {Matthias Kirchner and
778 booktitle = {Information Hiding - 14th International Conference, IH 2012,
779 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
780 author = {Jessica J. Fridrich and
782 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
786 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
788 publisher = springer,
789 address = springer_loc,
791 bibsource = {DBLP, http://dblp.uni-trier.de}
795 @article{DBLP:journals/tsp/DumitrescuWW03,
796 added-at = {2012-02-06T00:00:00.000+0100},
797 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
798 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
799 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
800 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
801 intrahash = {556caad9b61980d3458885153a52321c},
802 journal = {IEEE Transactions on Signal Processing},
806 timestamp = {2012-02-06T00:00:00.000+0100},
807 title = {Detection of LSB steganography via sample pair analysis.},
808 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
816 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
817 editor = {Nicolas D. Georganas and
818 Radu Popescu-Zeletin},
819 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
820 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
822 author = {Jessica J. Fridrich and
825 title = {Reliable detection of LSB steganography in color and grayscale
829 ee = {http://doi.acm.org/10.1145/1232454.1232466},
831 address = {New York, NY, USA},
833 bibsource = {DBLP, http://dblp.uni-trier.de}
840 @inproceedings{DBLP:conf/ih/PevnyFB10,
841 author = {Tom{\'a}s Pevn{\'y} and
844 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
846 editor = {Rainer B{\"o}hme and
847 Philip W. L. Fong and
848 Reihaneh Safavi-Naini},
849 booktitle = {Information Hiding - 12th International Conference, IH 2010,
850 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
855 publisher = springer,
856 address = springer_loc,
859 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
860 bibsource = {DBLP, http://dblp.uni-trier.de}
869 author = {Tom{\'a}s Pevn{\'y} and
873 title = {Break Our Steganographic System},
874 OPThowpublished = {},
877 note = {Available at \url{http://www.agents.cz/boss/}},
881 @proceedings{DBLP:conf/ih/2010,
882 editor = {Rainer B{\"o}hme and
883 Philip W. L. Fong and
884 Reihaneh Safavi-Naini},
885 title = {Information Hiding - 12th International Conference, IH 2010,
886 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
888 booktitle = {Information Hiding},
889 publisher = springer,
890 address = springer_loc,
894 isbn = {978-3-642-16434-7},
895 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
896 bibsource = {DBLP, http://dblp.uni-trier.de}
900 @article{DBLP:journals/eswa/ChenCL10,
901 added-at = {2010-07-21T15:44:10.000+0200},
902 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
903 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
905 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
906 interhash = {bc34a5f04661fee24ee62c39e76361be},
907 intrahash = {28889a4ab329da28559f0910469f054b},
908 journal = {Expert Systems with Applications},
912 timestamp = {2010-07-21T15:44:10.000+0200},
913 title = {High payload steganography mechanism using hybrid edge detector.},
914 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
919 @article{DBLP:journals/tifs/FillerJF11,
920 added-at = {2011-09-29T00:00:00.000+0200},
921 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
922 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
923 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
924 interhash = {b27d23ed0c9936d568e16c51378abccd},
925 intrahash = {50e43c05a74eec17524b3df8db442da5},
926 journal = {IEEE Transactions on Information Forensics and Security},
930 timestamp = {2011-09-29T00:00:00.000+0200},
931 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
932 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
940 @inproceedings{DBLP:conf/ih/KimDR06,
941 added-at = {2007-09-20T00:00:00.000+0200},
942 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
943 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
944 booktitle = {Information Hiding},
945 crossref = {DBLP:conf/ih/2006},
947 description = {dblp},
948 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
949 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
950 interhash = {399aab122b39cfd6f6e951a1b276c786},
951 intrahash = {f0324f70d62d9dfba568e393920aaa16},
952 isbn = {978-3-540-74123-7},
956 publisher = springer,
957 address = springer_loc,
959 timestamp = {2007-09-20T00:00:00.000+0200},
960 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
961 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
967 @proceedings{DBLP:conf/ih/2006,
968 editor = {Jan Camenisch and
969 Christian S. Collberg and
972 title = {Information Hiding, 8th International Workshop, IH 2006,
973 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
974 booktitle = {Information Hiding},
975 publisher = springer,
976 address = springer_loc,
980 isbn = {978-3-540-74123-7},
981 bibsource = {DBLP, http://dblp.uni-trier.de}
986 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
987 author = {Jessica J. Fridrich and
988 Tom{\'a}s Pevn{\'y} and
990 title = {Statistically undetectable jpeg steganography: dead ends
991 challenges, and opportunities},
993 ee = {http://doi.acm.org/10.1145/1288869.1288872},
994 editor = {Deepa Kundur and
995 Balakrishnan Prabhakaran and
997 Jessica J. Fridrich},
998 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
999 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1001 address = {New York, NY, USA},
1004 isbn = {978-1-59593-857-2},
1005 bibsource = {DBLP, http://dblp.uni-trier.de}
1011 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1012 editor = {Nasir D. Memon and
1014 Adnan M. Alattar and
1016 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1017 Electronic Imaging Symposium, San Jose, CA, USA, January
1018 18-20, 2010, Proceedings},
1019 author = {Tom{\'a}s Filler and
1021 Jessica J. Fridrich},
1022 title = {Minimizing embedding impact in steganography using trellis-coded
1026 ee = {http://dx.doi.org/10.1117/12.838002},
1027 bibsource = {DBLP, http://dblp.uni-trier.de},
1031 series = {SPIE Proceedings},
1042 @proceedings{DBLP:conf/mediaforensics/2010,
1043 editor = {Nasir D. Memon and
1045 Adnan M. Alattar and
1047 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1048 Electronic Imaging Symposium, San Jose, CA, USA, January
1049 18-20, 2010, Proceedings},
1050 booktitle = {Media Forensics and Security},
1053 series = {SPIE Proceedings},
1056 isbn = {978-0-8194-7934-1},
1057 bibsource = {DBLP, http://dblp.uni-trier.de}
1060 @article{DBLP:journals/corr/abs-1112-5239,
1061 author = {Jacques M. Bahi and
1062 Rapha{\"e}l Couturier and
1063 Christophe Guyeux and
1064 Pierre-Cyrille H{\'e}am},
1065 title = {Efficient and Cryptographically Secure Generation of Chaotic
1066 Pseudorandom Numbers on GPU},
1068 volume = {abs/1112.5239},
1070 ee = {http://arxiv.org/abs/1112.5239},
1071 bibsource = {DBLP, http://dblp.uni-trier.de}
1075 author = {Ponomarenko, Nikolay},
1076 title = {PSNR-HVS-M page},
1077 OPThowpublished = {},
1080 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1086 author = {Bovik, Alan C.},
1087 title = {BIQI page},
1088 OPThowpublished = {},
1091 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1096 @InProceedings{PSECAL07,
1097 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1098 title = {On between-coefficient contrast masking of DCT basis functions},
1099 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1102 editor = {Li,Baoxin},
1108 OPTorganization = {},
1116 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1117 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1118 journal = {IEEE Signal Processing Letters},
1129 @inproceedings{DBLP:conf/crypto/ShubBB82,
1130 author = {Lenore Blum and
1133 title = {Comparison of Two Pseudo-Random Number Generators},
1134 editor = {David Chaum and
1135 Ronald L. Rivest and
1137 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1138 Barbara, California, USA, August 23-25, 1982},
1140 bibsource = {DBLP, http://dblp.uni-trier.de},
1141 publisher = {Plenum Press},
1142 address={New York, NY, USA},
1145 bibsource = {DBLP, http://dblp.uni-trier.de}
1149 @inproceedings{Blum:1985:EPP:19478.19501,
1150 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1151 Barbara, California, USA, August 19-22, 1984, Proceedings},
1152 author = {Manuel Blum and
1154 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1155 Which Hides All Partial Information},
1159 editor = {G. R. Blakley and
1161 publisher = springer,
1162 address = springer_loc,
1169 @article{DBLP:journals/ejisec/FontaineG07,
1170 author = {Caroline Fontaine and
1172 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1173 journal = {EURASIP Journal on Information Security},
1178 ee = {http://dx.doi.org/10.1155/2007/13801},
1179 bibsource = {DBLP, http://dblp.uni-trier.de}
1183 @article{Luo:2010:EAI:1824719.1824720,
1184 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1185 title = {Edge adaptive image steganography based on LSB matching revisited},
1186 journal = {IEEE Transactions on Information Forensics and Security},
1194 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1195 doi = {10.1109/TIFS.2010.2041812},
1197 publisher = {IEEE Press},
1198 address = {Piscataway, NJ, USA},
1199 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1202 @article{Mielikainen06,
1203 author = {Mielikainen, J.},
1204 title = {LSB Matching Revisited},
1205 journal = {IEEE Signal Processing Letters},
1220 @article{Liu:2008:FMP:1284917.1285196,
1221 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1222 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1223 journal = {Pattern Recogn.},
1224 issue_date = {January, 2008},
1232 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1233 doi = {10.1016/j.patcog.2007.06.005},
1235 publisher = {Elsevier Science Inc.},
1236 address = {New York, NY, USA},
1237 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1242 @InProceedings{LHS08,
1243 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1244 title = {Textural features based universal steganalysis},
1247 booktitle = {Proc. SPIE 6819},
1258 OPTorganization = {},
1265 @InProceedings{KF11,
1266 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1267 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1270 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1274 pages = {78800L-78800L-13},
1283 OPTorganization = {},
1289 @article{DBLP:journals/tifs/KodovskyFH12,
1290 author = {Jan Kodovsk{\'y} and
1291 Jessica J. Fridrich and
1293 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1294 journal = {IEEE Transactions on Information Forensics and Security},
1299 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1300 bibsource = {DBLP, http://dblp.uni-trier.de}
1305 @article{Fillatre:2012:ASL:2333143.2333587,
1306 author = {Fillatre, Lionel},
1307 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1308 journal = {IEEE Transactions on Signal Processing},
1316 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1317 doi = {10.1109/TSP.2011.2174231},
1319 publisher = {IEEE Press},
1320 address = {Piscataway, NJ, USA},
1324 @inproceedings{Tyan1993,
1325 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1326 address = ieecs_loc,
1328 author = {Tyan, C. Y. and Wang, P. P.},
1329 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1330 citeulike-article-id = {7936501},
1331 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1333 posted-at = {2010-10-01 17:27:48},
1336 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1342 @article{Canny:1986:CAE:11274.11275,
1343 author = {Canny, J},
1344 title = {A Computational Approach to Edge Detection},
1345 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1346 issue_date = {June 1986},
1354 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1355 doi = {10.1109/TPAMI.1986.4767851},
1357 publisher = {IEEE Computer Society},
1358 address = {Washington, DC, USA},
1359 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1363 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1364 author = {Jessica J. Fridrich and
1365 Jan Kodovsk{\'y} and
1368 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1370 booktitle = {Information Hiding},
1373 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1374 crossref = {DBLP:conf/ih/2011},
1375 bibsource = {DBLP, http://dblp.uni-trier.de}
1377 @proceedings{DBLP:conf/ih/2011,
1378 editor = {Tom{\'a}s Filler and
1379 Tom{\'a}s Pevn{\'y} and
1382 title = {Information Hiding - 13th International Conference, IH 2011,
1383 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1385 booktitle = {Information Hiding},
1386 publisher = springer,
1387 address = springer_loc,
1391 isbn = {978-3-642-24177-2},
1392 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1393 bibsource = {DBLP, http://dblp.uni-trier.de}
1396 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1397 author = {Jessica J. Fridrich},
1398 title = {Modern Trends in Steganography and Steganalysis},
1402 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1403 crossref = {DBLP:conf/iwdw/2011},
1404 bibsource = {DBLP, http://dblp.uni-trier.de}
1406 @proceedings{DBLP:conf/iwdw/2011,
1407 editor = {Yun-Qing Shi and
1408 Hyoung-Joong Kim and
1409 Fernando P{\'e}rez-Gonz{\'a}lez},
1410 title = {Digital Forensics and Watermarking - 10th International
1411 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1412 2011, Revised Selected Papers},
1414 publisher = springer,
1415 address = springer_loc,
1419 isbn = {978-3-642-32204-4},
1420 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1421 bibsource = {DBLP, http://dblp.uni-trier.de}