1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
7 Michel Salomon, Jacques M Bahi},
8 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
11 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
19 address = {Belfast, UK},
29 author = {Guyeux, Christophe},
30 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
31 type = {Th\`ese de {D}octorat},
32 school = {LIFC, Universit\'e de Franche-Comt\'e},
34 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
35 month = {13 décembre},
40 @inproceedings{chgw+14:oip,
42 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
44 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
45 title = {Pseudorandom Number Generators with Balanced Gray Codes},
46 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
48 address = {Vienna, Austria},
57 @INPROCEEDINGS{nusmv02,
58 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
59 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
60 Sebastiani and Armando Tacchella},
61 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
65 crossref = {DBLP:conf/cav/2002}
69 author = {Nishanth Chandrasekaran},
70 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
75 Author = "Gastin, P. and Oddoux, D.",
76 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
77 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
78 Publisher = "Springer",
86 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
87 title = {A uniform deductive approach for parameterized protocol safety},
91 bibsource = {DBLP, http://dblp.uni-trier.de},
92 crossref = {DBLP:conf/kbse/2005},
93 ee = {http://doi.acm.org/10.1145/1101908.1101971}
96 @INPROCEEDINGS{abcvs05,
97 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
98 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
100 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
104 address = {Guelph, Canada},
106 note = {ISSN 1492-8760}
110 author = {Bahi, J. M.},
111 title = {Boolean totally asynchronous iterations},
119 author = {Bahi, J. M. and Contassot-Vivier, S.},
120 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
130 author = {Bahi, J. M. and Contassot-Vivier, S.},
131 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
136 pages = {1353--1363},
141 @inproceedings{bcgr11:ip,
143 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
146 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
147 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
148 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
152 doi = {10.1007/978-3-642-22953-4_11},
153 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
154 address = {Oslo, Norway},
162 @techreport{BCVC10:ir,
163 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
164 title = {Convergence Results of Combining Synchronism and Asynchronism for
165 Discrete-State Discrete-Time Dynamic Network},
167 institution = {LIFC - Laboratoire d’{I}nformatique de
168 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
169 type = {Research Report},
170 number = {RR2010-02},
171 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
175 @techreport{Cou10:ir,
176 author = {Couchot, J.-F.},
177 title = {Formal {C}onvergence {P}roof for {D}iscrete
178 {D}ynamical {S}ystems},
179 institution = {LIFC - Laboratoire d’{I}nformatique de
180 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
181 type = {Research Report},
182 number = {RR2010-03},
183 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
191 author = {Bahi, J. M. and Michel, C.},
192 title = {Convergence of discrete asynchronous iterations},
193 journal = {International Journal Computer Mathematics},
200 author = {Bahi, J. M. and Michel, C.},
201 title = {Simulations of asynchronous evolution of discrete systems},
202 journal = {Simulation Practice and Theory},
210 author = {G\'{e}rard M. Baudet},
211 title = {Asynchronous Iterative Methods for Multiprocessors},
217 doi = {http://doi.acm.org/10.1145/322063.322067},
223 title = {Parallel and distributed computation: numerical methods},
224 publisher = prenticeHall,
226 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
227 isbn = {0-13-648700-9}
231 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
232 title = {The software model checker Blast},
240 @INPROCEEDINGS{LeCun85,
242 title = {A learning scheme for threshold networks},
243 booktitle = {Cognitiva'95},
246 address = {Paris, France}
250 author = {Jeffrey L. Elman},
251 title = {Finding Structure in Time},
252 journal = {Cognitive Science},
259 author = {Andreas Frommer and Daniel B. Szyld},
260 title = {On asynchronous iterations},
266 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
272 author = {Goles Ch., E. and Salinas,L.},
273 title = {Comparison between parallel and serial dynamics of Boolean networks},
282 title = {The SPIN Model Checker: Primer and Reference Manual},
283 publisher = {Addison-Wesley, Pearson Education},
285 author = {Gerard J. Holzmann}
289 author = {Shih M.-H. and Ho, J.-L.},
290 title = {Solution of the Boolean Markus-Yamabe Problem},
291 journal = advapplMath,
299 author = {Adrien Richard},
300 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
302 journal = advapplMath,
311 author = {Adrien Richard and Jean-Paul Comet},
312 title = {Necessary conditions for multistationarity in discrete dynamical
314 journal = discreteapplMath,
317 pages = {2403--2413},
324 title = {Les syst\`emes dynamiques discrets},
325 publisher = springer,
327 author = {F. Robert},
329 series = {Math\'ematiques et Applications}
333 author = {Shih, M.-H. and Dong J.-L.},
334 title = {A combinatorial analogue of the Jacobian problem in automata networks},
335 journal = advapplMath,
344 author = {Thomas, R.},
345 title = {Boolean Formalization of Genetic Control Circuits},
353 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
354 title = {Absence of Cycles in Symmetric Neural Networks},
360 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
363 @PROCEEDINGS{DBLP:conf/cav/2002,
364 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
365 Denmark, July 27-31, 2002, Proceedings},
367 editor = {Ed Brinksma and Kim Guldstrand Larsen},
370 publisher = springer,
374 @PROCEEDINGS{DBLP:conf/kbse/2005,
375 title = {20th IEEE/ACM International Conference on Automated Software Engineering
376 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
378 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
380 bibsource = {DBLP, http://dblp.uni-trier.de},
385 author = {Ben-Ari, Mordechai},
387 title = {Principles of the Spin Model Checker},
388 isbn = {1846287693, 9781846287695}},
389 publisher = springer,
393 @INPROCEEDINGS{Wei97,
394 author = {Weise,Carsten},
395 title = {An incremental formal semantics for {PROMELA}},
396 booktitle = {SPIN97, the Third SPIN Workshop},
401 @PHDTHESIS{Couchot-PhD06,
402 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
403 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
406 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
407 TYPE = {Th\`ese de {D}octorat},
412 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
413 Page, M. and Tewfik, S. and Geiselmann, J.},
414 title = {Qualitative simulation of genetic regulatory networks
415 using piecewise-linear models},
416 journal = {Bull. Math. Biol.},
428 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
429 title = {A Fruitful Application of Formal Methods to Biological
430 Regulatory Networks: Extending {T}homas' Asynchronous
431 Logical Approach with Temporal Logic},
432 journal = {J. Theor. Biol.},
442 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
443 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
444 journal = {Biosystems},
456 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
458 title = {Genetic Network Analyzer: qualitative simulation
459 of genetic regulatory networks.},
460 journal = {Bioinformatics},
468 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
469 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
470 journal = {Genes, Genomes and Genomics},
482 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
483 title = {Analysing formal models of genetic regulatory networks with delays},
484 journal = {Int. J. Bioinformatics Res. Appl.},
490 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
491 publisher = {Inderscience Publishers},
492 address = {Inderscience Publishers, Geneva, SWITZERLAND},
495 author = {Richard, A.},
496 title = {Local negative circuits and fixed points in Boolean networks},
497 institution = {preprint arXiv number 0910.0750},
510 author = {Remy, R. and Ruet, P. and Thieffry, D.},
511 title = {Graphic requirement for multistability and attractive cycles in a
512 Boolean dynamical framework},
513 journal = {Advances in Applied Mathematics},
519 timestamp = {2009.02.05}
522 @inproceedings{DBLP:conf/icann/BahiCMMS06,
523 author = {Jacques M. Bahi and
524 Sylvain Contassot-Vivier and
528 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
529 in Heterogeneous Environments},
530 booktitle = {ICANN (2)},
533 ee = {http://dx.doi.org/10.1007/11840930_81},
534 crossref = {DBLP:conf/icann/2006-2},
535 bibsource = {DBLP, http://dblp.uni-trier.de}
538 @proceedings{DBLP:conf/icann/2006-2,
539 editor = {Stefanos D. Kollias and
540 Andreas Stafylopatis and
543 title = {Artificial Neural Networks - ICANN 2006, 16th International
544 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
546 booktitle = {ICANN (2)},
547 publisher = {Springer},
548 series = {Lecture Notes in Computer Science},
551 isbn = {3-540-38871-0},
552 bibsource = {DBLP, http://dblp.uni-trier.de}
559 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
561 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
562 publisher = {Eyrolles},
580 title = {An Introduction to Chaotic Dynamical Systems},
581 publisher = {Redwood City: Addison-Wesley},
583 author = {R. L. Devaney},
586 timestamp = {27/01/2008}
592 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
595 impact-factor ={1.255},
596 isi-acro = {MECHATRONICS},
597 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
598 title = {Active {MEMS}-based flow control using artificial neural network},
599 journal = {Mechatronics},
603 doi = {10.1016/j.mechatronics.2013.02.010},
604 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
605 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
606 publisher = {Elsevier},
609 note = {Available online. Paper version to appear},
614 @inproceedings{cds12:ip,
616 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
619 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
620 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
621 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
623 editor = {Bourgeois, Julien and de Labachelerie, Michel},
624 address = {Besan\c{c}on, France},
625 publisher = {IEEE CPS},
634 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
637 impact-factor ={2.081},
639 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
640 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
641 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
644 pages = {013122-1 -- 013122-9},
645 doi = {10.1063/1.3685524},
646 url = {http://dx.doi.org/10.1063/1.3685524},
647 publisher = {American Institute of Physics},
655 @inproceedings{bgs11:ip,
657 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
660 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
661 title = {Building a Chaotic Proven Neural Network},
662 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
663 address = {Maldives, Maldives},
669 author = {Bahi, Jacques M. and Guyeux, Christophe},
670 title = {Hash Functions Using Chaotic Iterations},
671 journal = {Journal of Algorithms \& Computational Technology},
676 classement = {ACLNI},
677 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
686 @PHDTHESIS{GuyeuxThese10,
687 author = {Christophe Guyeux},
688 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
689 en s\'{e}curit\'{e} informatique},
690 school = {Universit\'{e} de Franche-Comt\'{e}},
692 owner = {christophe},
693 timestamp = {2010.12.21}
696 @INPROCEEDINGS{gfb10:ip,
697 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
698 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
699 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
700 Multimedia Signal Processing},
703 address = {Darmstadt, Germany},
706 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
713 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
714 title = {Topological entropy},
715 journal = {Transactions of the American Mathematical Society},
720 timestamp = {2008.05.29}
724 author = {Rufus Bowen},
725 title = {Entropy for group endomorphisms and homogeneous spaces},
726 journal = {Transactions of the American Mathematical Society},
731 timestamp = {15/02/2008}
734 @article{10.1109/CIMSiM.2010.36,
735 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
736 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
737 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
741 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
742 publisher = {IEEE Computer Society},
743 address = {Los Alamitos, CA, USA},
745 @article{10.1109/ICME.2003.1221665,
746 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
747 title = {Neural network based steganalysis in still images},
748 journal ={Multimedia and Expo, IEEE International Conference on},
752 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
753 publisher = {IEEE Computer Society},
754 address = {Los Alamitos, CA, USA},
757 @ARTICLE{Sullivan06steganalysisfor,
758 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
759 title = {Steganalysis for Markov cover data with applications to images},
760 journal = {IEEE Transactions on Information Forensics and Security},
769 author = "Gray, Frank",
770 title = "Pulse code communication",
771 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
776 @INPROCEEDINGS{guyeux10ter,
777 author = {Bahi, Jacques M. and Guyeux, Christophe},
778 title = {A new chaos-based watermarking algorithm},
779 booktitle = {SECRYPT'10, International Conference on Security
783 address = {Athens, Greece},
785 publisher = {SciTePress},
787 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
793 @inproceedings{Qiao:2009:SM:1704555.1704664,
794 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
795 title = {Steganalysis of MP3Stego},
796 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
799 location = {Atlanta, Georgia, USA},
800 pages = {2723--2728},
802 publisher = {IEEE Press}
805 @inproceedings{CouchotD07IFM,
807 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
810 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
811 title = {Guiding the Correction of Parameterized Specifications},
812 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
816 publisher = {Springer},
817 doi = {10.1007/978-3-540-73210-5_10},
818 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
819 address = {Oxford, UK},
825 @inproceedings{couchot07FTP,
829 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
830 title = {A Graph-based Strategy for the Selection of Hypotheses},
831 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
832 address = {Liverpool, UK},
839 @inproceedings{cgs09:ip,
841 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
844 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
845 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
846 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
847 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
848 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
849 publisher = {ACM Press},
851 url = {http://arxiv.org/abs/0907.1357},
852 otherUrl = {http://hal.inria.fr/inria-00402204},
853 address = {Grenoble, France},
854 editor = {Hassen Sa\"{i}di and N. Shankar},
861 @inproceedings{couchot07cade,
865 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
866 title = {Handling Polymorphism in Automated Deduction},
867 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
871 publisher = {Springer},
872 isbn = {978-3-540-73594-6},
873 doi = {10.1007/978-3-540-73595-3_18},
874 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
875 address = {Bremen, Germany},
887 @inproceedings{BCDG07,
889 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
892 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
893 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
894 booktitle = {B'2007, the 7th Int. B Conference},
898 publisher = {Springer},
899 doi = {10.1007/11955757_10},
900 url = {http://dx.doi.org/10.1007/11955757_10},
901 editor = {Julliand, Jacques and Kouchnarenko, Olga},
902 address = {Besancon, France},
910 @article{byrd1995limited,
911 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
912 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
913 journal = {SIAM J. Sci. Comput.},
914 issue_date = {Sept. 1995},
920 pages = {1190--1208},
922 url = {http://dx.doi.org/10.1137/0916069},
923 doi = {10.1137/0916069},
925 publisher = {Society for Industrial and Applied Mathematics},
926 address = {Philadelphia, PA, USA},
927 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
930 @article{ANU:1770520,
931 author = {Powell,M. J. D.},
932 title = {Direct search algorithms for optimization calculations},
933 journal = {Acta Numerica},
940 doi = {10.1017/S0962492900002841},
941 URL = {http://journals.cambridge.org/article_S0962492900002841},
947 journal={The Journal of Supercomputing},
950 doi={10.1007/s11227-010-0500-5},
951 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
952 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
953 publisher={Springer US},
954 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
955 author={Wang, Honggang},
961 author={Yifeng He and Lee, I. and Ling Guan},
962 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
963 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
968 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
969 doi={10.1109/TCSVT.2009.2017411},
973 author={Palomar, D.P. and Mung Chiang},
974 journal={Selected Areas in Communications, IEEE Journal on},
975 title={A tutorial on decomposition methods for network utility maximization},
980 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
981 doi={10.1109/JSAC.2006.879350},
986 journal={EURASIP Journal on Information Security},
990 doi={10.1186/1687-417X-2014-1},
991 title={Universal distortion function for steganography in an arbitrary domain},
992 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
993 publisher={Springer International Publishing},
994 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
998 @inproceedings{conf/wifs/HolubF12,
999 added-at = {2013-01-23T00:00:00.000+0100},
1000 author = {Holub, Vojtech and Fridrich, Jessica J.},
1001 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1003 crossref = {conf/wifs/2012},
1004 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1005 interhash = {cbef658a6868216eef585dd759ae0668},
1006 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1007 isbn = {978-1-4673-2285-0},
1011 timestamp = {2013-01-23T00:00:00.000+0100},
1012 title = {Designing steganographic distortion using directional filters.},
1013 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1020 @article{FillerJF11,
1021 author = {Tom{\'a}s Filler and
1023 Jessica J. Fridrich},
1024 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1026 journal = {IEEE Transactions on Information Forensics and Security},
1031 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1032 bibsource = {DBLP, http://dblp.uni-trier.de}
1035 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1036 editor = {Ira S. Moskowitz},
1037 author = {Shelby Pereira and
1038 Sviatoslav Voloshynovskiy and
1040 St{\'e}phane Marchand-Maillet and
1042 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1043 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1044 title = {Second Generation Benchmarking and Application Oriented
1049 publisher = springer,
1050 address = springer_loc,
1056 @inproceedings{DBLP:conf/ih/Westfeld01,
1057 added-at = {2011-06-28T00:00:00.000+0200},
1058 author = {Westfeld, Andreas},
1059 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1060 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1061 editor = {Ira S. Moskowitz},
1063 publisher = springer,
1064 address = springer_loc,
1067 title = {F5-A Steganographic Algorithm.},
1076 @article{Chang20101286,
1077 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1078 journal = "Digital Signal Processing",
1081 pages = "1286 - 1307",
1085 doi = "10.1016/j.dsp.2009.11.005",
1086 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1087 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1088 keywords = "Security",
1089 keywords = "Wet paper coding",
1090 keywords = "Steganography",
1091 keywords = "Indicator",
1092 keywords = "Fuzzy edge detector"
1097 @article{Hu:2007:HPE:1282866.1282944,
1098 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1099 title = {A high performance edge detector based on fuzzy inference rules},
1100 journal = {Inf. Sci.},
1101 issue_date = {November, 2007},
1107 pages = {4768--4784},
1109 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1110 doi = {10.1016/j.ins.2007.04.001},
1112 publisher = {Elsevier Science Inc.},
1113 address = {New York, NY, USA},
1114 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1118 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1119 author = {Sorina Dumitrescu and
1121 editor = {Ahmet M. Eskicioglu and
1122 Jessica J. Fridrich and
1124 title = {LSB steganalysis based on high-order statistics},
1125 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1126 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1129 address = {New York, NY, USA},
1132 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1133 bibsource = {DBLP, http://dblp.uni-trier.de}
1136 @inproceedings{DBLP:conf/ih/Ker05,
1137 author = {Andrew D. Ker},
1138 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1139 editor = {Mauro Barni and
1140 Jordi Herrera-Joancomart\'{\i} and
1141 Stefan Katzenbeisser and
1142 Fernando P{\'e}rez-Gonz{\'a}lez},
1143 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1144 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1147 ee = {http://dx.doi.org/10.1007/11558859_22},
1148 publisher = springer,
1149 address = springer_loc,
1156 @inproceedings{FK12,
1157 editor = {Matthias Kirchner and
1159 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1160 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1161 author = {Jessica J. Fridrich and
1163 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1167 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1169 publisher = springer,
1170 address = springer_loc,
1172 bibsource = {DBLP, http://dblp.uni-trier.de}
1176 @article{DBLP:journals/tsp/DumitrescuWW03,
1177 added-at = {2012-02-06T00:00:00.000+0100},
1178 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1179 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1180 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1181 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1182 intrahash = {556caad9b61980d3458885153a52321c},
1183 journal = {IEEE Transactions on Signal Processing},
1186 pages = {1995-2007},
1187 timestamp = {2012-02-06T00:00:00.000+0100},
1188 title = {Detection of LSB steganography via sample pair analysis.},
1189 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1197 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1198 editor = {Nicolas D. Georganas and
1199 Radu Popescu-Zeletin},
1200 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1201 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1203 author = {Jessica J. Fridrich and
1206 title = {Reliable detection of LSB steganography in color and grayscale
1210 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1212 address = {New York, NY, USA},
1214 bibsource = {DBLP, http://dblp.uni-trier.de}
1221 @inproceedings{DBLP:conf/ih/PevnyFB10,
1222 author = {Tom{\'a}s Pevn{\'y} and
1223 Tom{\'a}s Filler and
1225 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1227 editor = {Rainer B{\"o}hme and
1228 Philip W. L. Fong and
1229 Reihaneh Safavi-Naini},
1230 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1231 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1236 publisher = springer,
1237 address = springer_loc,
1240 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1241 bibsource = {DBLP, http://dblp.uni-trier.de}
1250 author = {Tom{\'a}s Pevn{\'y} and
1251 Tom{\'a}s Filler and
1254 title = {Break Our Steganographic System},
1255 OPThowpublished = {},
1258 note = {Available at \url{http://www.agents.cz/boss/}},
1262 @proceedings{DBLP:conf/ih/2010,
1263 editor = {Rainer B{\"o}hme and
1264 Philip W. L. Fong and
1265 Reihaneh Safavi-Naini},
1266 title = {Information Hiding - 12th International Conference, IH 2010,
1267 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1269 booktitle = {Information Hiding},
1270 publisher = springer,
1271 address = springer_loc,
1275 isbn = {978-3-642-16434-7},
1276 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1277 bibsource = {DBLP, http://dblp.uni-trier.de}
1281 @article{DBLP:journals/eswa/ChenCL10,
1282 added-at = {2010-07-21T15:44:10.000+0200},
1283 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1284 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1285 date = {2010-05-03},
1286 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1287 interhash = {bc34a5f04661fee24ee62c39e76361be},
1288 intrahash = {28889a4ab329da28559f0910469f054b},
1289 journal = {Expert Systems with Applications},
1292 pages = {3292-3301},
1293 timestamp = {2010-07-21T15:44:10.000+0200},
1294 title = {High payload steganography mechanism using hybrid edge detector.},
1295 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1300 @article{DBLP:journals/tifs/FillerJF11,
1301 added-at = {2011-09-29T00:00:00.000+0200},
1302 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1303 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1304 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1305 interhash = {b27d23ed0c9936d568e16c51378abccd},
1306 intrahash = {50e43c05a74eec17524b3df8db442da5},
1307 journal = {IEEE Transactions on Information Forensics and Security},
1311 timestamp = {2011-09-29T00:00:00.000+0200},
1312 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1313 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1321 @inproceedings{DBLP:conf/ih/KimDR06,
1322 added-at = {2007-09-20T00:00:00.000+0200},
1323 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1324 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1325 booktitle = {Information Hiding},
1326 crossref = {DBLP:conf/ih/2006},
1327 date = {2007-09-20},
1328 description = {dblp},
1329 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1330 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1331 interhash = {399aab122b39cfd6f6e951a1b276c786},
1332 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1333 isbn = {978-3-540-74123-7},
1337 publisher = springer,
1338 address = springer_loc,
1340 timestamp = {2007-09-20T00:00:00.000+0200},
1341 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1342 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1348 @proceedings{DBLP:conf/ih/2006,
1349 editor = {Jan Camenisch and
1350 Christian S. Collberg and
1353 title = {Information Hiding, 8th International Workshop, IH 2006,
1354 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1355 booktitle = {Information Hiding},
1356 publisher = springer,
1357 address = springer_loc,
1361 isbn = {978-3-540-74123-7},
1362 bibsource = {DBLP, http://dblp.uni-trier.de}
1367 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1368 author = {Jessica J. Fridrich and
1369 Tom{\'a}s Pevn{\'y} and
1371 title = {Statistically undetectable jpeg steganography: dead ends
1372 challenges, and opportunities},
1374 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1375 editor = {Deepa Kundur and
1376 Balakrishnan Prabhakaran and
1378 Jessica J. Fridrich},
1379 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1380 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1382 address = {New York, NY, USA},
1385 isbn = {978-1-59593-857-2},
1386 bibsource = {DBLP, http://dblp.uni-trier.de}
1392 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1393 editor = {Nasir D. Memon and
1395 Adnan M. Alattar and
1397 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1398 Electronic Imaging Symposium, San Jose, CA, USA, January
1399 18-20, 2010, Proceedings},
1400 author = {Tom{\'a}s Filler and
1402 Jessica J. Fridrich},
1403 title = {Minimizing embedding impact in steganography using trellis-coded
1407 ee = {http://dx.doi.org/10.1117/12.838002},
1408 bibsource = {DBLP, http://dblp.uni-trier.de},
1412 series = {SPIE Proceedings},
1423 @proceedings{DBLP:conf/mediaforensics/2010,
1424 editor = {Nasir D. Memon and
1426 Adnan M. Alattar and
1428 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1429 Electronic Imaging Symposium, San Jose, CA, USA, January
1430 18-20, 2010, Proceedings},
1431 booktitle = {Media Forensics and Security},
1434 series = {SPIE Proceedings},
1437 isbn = {978-0-8194-7934-1},
1438 bibsource = {DBLP, http://dblp.uni-trier.de}
1441 @article{DBLP:journals/corr/abs-1112-5239,
1442 author = {Jacques M. Bahi and
1443 Rapha{\"e}l Couturier and
1444 Christophe Guyeux and
1445 Pierre-Cyrille H{\'e}am},
1446 title = {Efficient and Cryptographically Secure Generation of Chaotic
1447 Pseudorandom Numbers on GPU},
1449 volume = {abs/1112.5239},
1451 ee = {http://arxiv.org/abs/1112.5239},
1452 bibsource = {DBLP, http://dblp.uni-trier.de}
1456 author = {Ponomarenko, Nikolay},
1457 title = {PSNR-HVS-M page},
1458 OPThowpublished = {},
1461 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1467 author = {Bovik, Alan C.},
1468 title = {BIQI page},
1469 OPThowpublished = {},
1472 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1477 @InProceedings{PSECAL07,
1478 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1479 title = {On between-coefficient contrast masking of DCT basis functions},
1480 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1483 editor = {Li,Baoxin},
1489 OPTorganization = {},
1497 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1498 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1499 journal = {IEEE Signal Processing Letters},
1510 @inproceedings{DBLP:conf/crypto/ShubBB82,
1511 author = {Lenore Blum and
1514 title = {Comparison of Two Pseudo-Random Number Generators},
1515 editor = {David Chaum and
1516 Ronald L. Rivest and
1518 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1519 Barbara, California, USA, August 23-25, 1982},
1521 bibsource = {DBLP, http://dblp.uni-trier.de},
1522 publisher = {Plenum Press},
1523 address={New York, NY, USA},
1526 bibsource = {DBLP, http://dblp.uni-trier.de}
1530 @inproceedings{Blum:1985:EPP:19478.19501,
1531 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1532 Barbara, California, USA, August 19-22, 1984, Proceedings},
1533 author = {Manuel Blum and
1535 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1536 Which Hides All Partial Information},
1540 editor = {G. R. Blakley and
1542 publisher = springer,
1543 address = springer_loc,
1550 @article{DBLP:journals/ejisec/FontaineG07,
1551 author = {Caroline Fontaine and
1553 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1554 journal = {EURASIP Journal on Information Security},
1559 ee = {http://dx.doi.org/10.1155/2007/13801},
1560 bibsource = {DBLP, http://dblp.uni-trier.de}
1564 @article{Luo:2010:EAI:1824719.1824720,
1565 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1566 title = {Edge adaptive image steganography based on LSB matching revisited},
1567 journal = {IEEE Transactions on Information Forensics and Security},
1575 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1576 doi = {10.1109/TIFS.2010.2041812},
1578 publisher = {IEEE Press},
1579 address = {Piscataway, NJ, USA},
1580 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1583 @article{Mielikainen06,
1584 author = {Mielikainen, J.},
1585 title = {LSB Matching Revisited},
1586 journal = {IEEE Signal Processing Letters},
1601 @article{Liu:2008:FMP:1284917.1285196,
1602 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1603 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1604 journal = {Pattern Recogn.},
1605 issue_date = {January, 2008},
1613 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1614 doi = {10.1016/j.patcog.2007.06.005},
1616 publisher = {Elsevier Science Inc.},
1617 address = {New York, NY, USA},
1618 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1623 @InProceedings{LHS08,
1624 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1625 title = {Textural features based universal steganalysis},
1628 booktitle = {Proc. SPIE 6819},
1639 OPTorganization = {},
1646 @InProceedings{KF11,
1647 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1648 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1651 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1655 pages = {78800L-78800L-13},
1664 OPTorganization = {},
1670 @article{DBLP:journals/tifs/KodovskyFH12,
1671 author = {Jan Kodovsk{\'y} and
1672 Jessica J. Fridrich and
1674 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1675 journal = {IEEE Transactions on Information Forensics and Security},
1680 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1681 bibsource = {DBLP, http://dblp.uni-trier.de}
1686 @article{Fillatre:2012:ASL:2333143.2333587,
1687 author = {Fillatre, Lionel},
1688 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1689 journal = {IEEE Transactions on Signal Processing},
1697 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1698 doi = {10.1109/TSP.2011.2174231},
1700 publisher = {IEEE Press},
1701 address = {Piscataway, NJ, USA},
1705 @inproceedings{Tyan1993,
1706 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1707 address = ieecs_loc,
1709 author = {Tyan, C. Y. and Wang, P. P.},
1710 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1711 citeulike-article-id = {7936501},
1712 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1714 posted-at = {2010-10-01 17:27:48},
1717 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1723 @article{Canny:1986:CAE:11274.11275,
1724 author = {Canny, J},
1725 title = {A Computational Approach to Edge Detection},
1726 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1727 issue_date = {June 1986},
1735 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1736 doi = {10.1109/TPAMI.1986.4767851},
1738 publisher = {IEEE Computer Society},
1739 address = {Washington, DC, USA},
1740 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1744 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1745 author = {Jessica J. Fridrich and
1746 Jan Kodovsk{\'y} and
1749 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1751 booktitle = {Information Hiding},
1754 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1755 crossref = {DBLP:conf/ih/2011},
1756 bibsource = {DBLP, http://dblp.uni-trier.de}
1758 @proceedings{DBLP:conf/ih/2011,
1759 editor = {Tom{\'a}s Filler and
1760 Tom{\'a}s Pevn{\'y} and
1763 title = {Information Hiding - 13th International Conference, IH 2011,
1764 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1766 booktitle = {Information Hiding},
1767 publisher = springer,
1768 address = springer_loc,
1772 isbn = {978-3-642-24177-2},
1773 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1774 bibsource = {DBLP, http://dblp.uni-trier.de}
1777 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1778 author = {Jessica J. Fridrich},
1779 title = {Modern Trends in Steganography and Steganalysis},
1783 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1784 crossref = {DBLP:conf/iwdw/2011},
1785 bibsource = {DBLP, http://dblp.uni-trier.de}
1787 @proceedings{DBLP:conf/iwdw/2011,
1788 editor = {Yun-Qing Shi and
1789 Hyoung-Joong Kim and
1790 Fernando P{\'e}rez-Gonz{\'a}lez},
1791 title = {Digital Forensics and Watermarking - 10th International
1792 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1793 2011, Revised Selected Papers},
1795 publisher = springer,
1796 address = springer_loc,
1800 isbn = {978-3-642-32204-4},
1801 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1802 bibsource = {DBLP, http://dblp.uni-trier.de}
1808 @article{MCErlang07,
1809 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1810 title = {McErlang: a model checker for a distributed functional programming language},
1811 journal = {SIGPLAN Not.},
1820 @inproceedings{Bogor03,
1822 Matthew B. Dwyer and
1824 title = {Bogor: an extensible and highly-modular software model checking
1826 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1827 of Software Engineering 2003},
1835 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1836 title = {On Devaney's Definition of Chaos},
1837 journal = {Amer. Math. Monthly},
1843 timestamp = {27/01/2008}
1846 @article{Crook2007267,
1847 title = "Pattern recall in networks of chaotic neurons",
1848 journal = "Biosystems",
1851 pages = "267 - 274",
1854 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1855 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1857 keywords = "Spiking neural network"
1861 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1862 title = {A novel Hash algorithm construction based on chaotic neural network},
1863 journal = {Neural Computing and Applications},
1866 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1869 keyword = {Computer Science},
1870 publisher = {Springer London}
1874 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1875 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1881 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1882 doi={10.1109/TCE.2004.1309431},
1885 @article{Zhang2005759,
1886 title = "An image encryption approach based on chaotic maps",
1887 journal = "Chaos, Solitons \& Fractals",
1890 pages = "759 - 765",
1894 doi = "10.1016/j.chaos.2004.09.035",
1895 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1898 @article{Lian20091296,
1899 title = "A block cipher based on chaotic neural networks",
1900 journal = "Neurocomputing",
1903 pages = "1296 - 1301",
1906 author = "Shiguo Lian",
1907 keywords = "Neural network",
1909 keywords = "Security",
1910 keywords = "Block cipher",
1911 keywords = "Image encryption"
1915 author = {George Cybenko},
1916 title = {Approximation by Superpositions of a Sigmoidal function},
1917 journal = {Mathematics of Control, Signals and Systems},
1924 @article{DBLP:journals/nn/HornikSW89,
1925 author = {Kurt Hornik and
1926 Maxwell B. Stinchcombe and
1928 title = {Multilayer feedforward networks are universal approximators},
1929 journal = {Neural Networks},
1934 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1935 bibsource = {DBLP, http://dblp.uni-trier.de}
1938 @article{dalkiran10,
1939 author = {Ilker Dalkiran and Kenan Danisman},
1940 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1941 title = {Artificial neural network based chaotic generator for cryptology},
1949 @article{springerlink:10.1007/s00521-010-0432-2,
1950 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1951 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1952 title = {A novel Hash algorithm construction based on chaotic neural network},
1953 journal = {Neural Computing and Applications},
1954 publisher = {Springer},
1956 keyword = {Computer Science},
1962 @article{Feder2009NTB,
1963 author = {Feder, Tom\'{a}s and Subi, Carlos},
1964 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
1965 journal = {Inf. Process. Lett.},
1966 issue_date = {February, 2009},
1974 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
1975 doi = {10.1016/j.ipl.2008.10.015},
1977 publisher = {Elsevier North-Holland, Inc.},
1978 address = {Amsterdam, The Netherlands, The Netherlands},
1979 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
1985 author={Zanten, A.~J.~van and Suparta, I.~N.},
1986 title={ Totally balanced and exponentially balanced Gray codes},
1987 journal={Discrete Analysis and Operational Research},
1995 @book{LevinPeresWilmer2006,
1996 added-at = {2010-01-19T17:51:27.000+0100},
1997 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
1998 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
1999 interhash = {61354795a6accb6407bfdbf04753a683},
2000 intrahash = {097dc4d1d0e412b2444f540b04110797},
2001 keywords = {markovchains probabilitytheory textbook},
2002 publisher = {American Mathematical Society},
2003 timestamp = {2010-01-19T17:51:27.000+0100},
2004 title = {{Markov chains and mixing times}},
2005 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2010 author = {M. Mitzenmacher and Eli Upfal},
2012 title = {Probability and Computing},
2013 publisher = {Cambridge University Press},
2019 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2022 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2023 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2024 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},