1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @article{DBLP:journals/tifs/PevnyBF10,
5 author = {Tom{\'{a}}s Pevn{\'{y}} and
8 title = {Steganalysis by subtractive pixel adjacency matrix},
9 journal = {{IEEE} Transactions on Information Forensics and Security},
14 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
15 doi = {10.1109/TIFS.2010.2045842},
16 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
17 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
18 bibsource = {dblp computer science bibliography, http://dblp.org}
22 @INPROCEEDINGS{rifq/others03,
23 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
26 x-international-audience = {yes},
27 title = {{D}iscrimination power of measures of resemblance},
28 booktitle = {{IFSA}'03},
30 location = {Istanbul, Turkey}
34 @ARTICLE{Rifqi:2000:DPM:342947.342970,
35 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
38 x-international-audience = {yes},
39 title = {{D}iscrimination power of measures of comparison},
40 journal = {{F}uzzy {S}ets and {S}ystems},
48 @book{Anderberg-Cluster-1973,
49 added-at = {2008-10-29T00:31:48.000+0100},
50 author = {Anderberg, M. R.},
51 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
52 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
53 intrahash = {f586cc49441c591f06539d11d3e06006},
54 keywords = {cluster_analysis wismasys0809},
55 publisher = {Academic Press},
56 timestamp = {2008-10-29T00:31:48.000+0100},
57 title = {Cluster Analysis for Applications},
63 @article{yule1950introduction,
64 Author = {Yule, G.U. and Kendall, MG},
65 Date-Added = {2009-08-14 22:16:50 -0500},
66 Date-Modified = {2009-08-14 22:16:50 -0500},
67 Journal = {Statistics},
68 Title = {An Introduction to the Theory of},
72 @inproceedings{fgb11:ip,
74 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
77 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
78 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
79 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
81 address = {Sevilla, Spain},
82 editor = {Javier Lopez and Pierangela Samarati},
83 publisher = {SciTePress},
91 author = {Cayre, F. and Bas, P.},
92 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
93 journal = {IEEE Transactions on Information Forensics and Security},
98 doi = {10.1109/TIFS.2007.916006},
100 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
101 security, watermarking, Kerckhoffs-based embedding security classes,
102 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
103 steganography security, watermark-only-attack, watermarking, Security,
104 spread-spectrum (SS) watermarking},
106 timestamp = {2009.06.29}
108 @INPROCEEDINGS{Perez06,
109 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
110 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
112 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
124 author = {Cayre, F. and Fontaine, C. and Furon, T.},
125 title = {Watermarking security: theory and practice},
126 journal = {IEEE Transactions on Signal Processing},
129 pages = {3976--3987},
131 keywords = {blind source separation, cryptography, watermarking, Fisher information
132 matrix, blind source separation, cryptanalysis, information theory,
133 spread spectrum techniques, substitutive scheme, watermarking security,
134 Blind source separation, Fisher information matrix, equivocation,
135 security, watermarking}
140 @inproceedings{Shujun1,
141 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
142 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
143 Their Roles in Cryptography and Pseudo-Random Coding},
144 booktitle = {Cryptography and Coding, 8th IMA International Conference,
148 publisher = springer,
149 address = springer_loc,
157 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
160 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
161 title = {Random Walk in a N-cube Without Hamiltonian Cycle
162 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
164 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
172 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
175 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
176 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
177 howpublished = {in submission to the ACM Computing Surveys journal},
184 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
190 Couchot, Jean-Fran{\c}cois and
191 Couturier, Rapha\¨el},
192 title = {Blind digital watermarking in PDF documents using
193 Spread Transform Dither Modulation},
194 howpublished = {in submission to the Multimedia Tools and Applications journal},
203 @inproceedings{couchot04:onp,
205 author = {Couchot, Jean-Fran\c{c}ois},
206 title = {V\'erification d'invariant par superposition},
207 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
208 address = {Calais, France},
209 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
210 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
211 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
212 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
221 @inproceedings{aangc+15:ip,
223 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
226 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
227 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
228 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
230 doi = {10.1007/978-3-319-16483-0_38},
231 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
234 address = {Granada, Spain},
246 @inproceedings{agcs+15:ip,
248 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
251 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
252 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
253 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
254 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
256 series = {LNCS/LNBI},
258 publisher = {Springer},
259 address = {Mexico City, Mexico},
263 note = {To appear in the LNCS/LNBI series},
269 @inproceedings{bcg11:ip,
271 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
274 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
275 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
276 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
278 address = {Luxembourg, Luxembourg},
281 note = {Best paper award},
287 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
289 classement = {ACLNI},
292 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
293 title = {Quality analysis of a chaotic proven keyed hash function},
294 journal = {International Journal On Advances in Internet Technology},
306 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
311 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
312 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
313 journal = {Annals of Telecommunications},
314 doi = {10.1007/s12243-015-0466-7},
315 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
316 publisher = {Springer},
318 note = {Available online. Paper version to appear},
322 @inproceedings{fccg15:ip,
324 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
327 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
328 title = {Steganalyzer performances in operational contexts},
329 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
331 address = {Adelaide, Australia},
339 @inproceedings{bcfg12a:ip,
341 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
344 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
345 title = {Application of Steganography for Anonymity through the Internet},
346 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
348 url = {http://arxiv.org/abs/1202.5302v1},
349 address = {Venice, Italy},
356 @inproceedings{bcfg+13:ip,
358 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
361 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
362 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
363 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
365 doi = {10.1109/IIH-MSP.2013.141},
366 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
367 address = {Beijing, China},
373 @inproceedings{bcfg12b:ip,
375 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
378 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
379 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
380 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
382 address = {Venice, Italy},
392 @inproceedings{bcg11b:ip,
394 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
397 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
398 title = {Steganography: a Class of Algorithms having Secure Properties},
399 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
401 address = {Dalian, China},
410 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
413 impact-factor ={1.363},
414 isi-acro = {COMPUT J},
415 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
416 title = {Steganography: a class of secure and robust algorithms},
417 journal = {The Computer Journal},
421 doi = {10.1093/comjnl/bxr116},
422 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
423 publisher = {Oxford University Press},
429 @inproceedings{bcgw11:ip,
431 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
434 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
435 title = {Class of Trustworthy Pseudo Random Number Generators},
436 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
438 address = {Luxembourg, Luxembourg},
446 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
449 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
450 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
451 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
461 @inproceedings{aagp+15:ip,
463 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
465 classement = {ACTIN},
466 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
467 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
468 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
470 address = {Naples, Italy},
478 @inproceedings{acgm+14:ij,
480 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
483 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
484 title = {Finding the Core-Genes of Chloroplasts},
485 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
487 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
489 doi = {10.7763/IJBBB.2014.V4.371},
490 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
491 address = {Copenhagen, Denmark},
501 @inproceedings{akgcs+14:oip,
503 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
506 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
507 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
508 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
509 address = {Belfast, United Kingdom},
513 note = {Short paper},
518 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
521 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
522 title = {Finding the core-genes of Chloroplast Species},
523 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
533 @PhdThesis{guyeuxphd,
534 author = {Guyeux, Christophe},
535 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
536 type = {Th\`ese de {D}octorat},
537 school = {LIFC, Universit\'e de Franche-Comt\'e},
539 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
540 month = {13 décembre},
545 @inproceedings{chgw+14:oip,
547 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
549 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
550 title = {Pseudorandom Number Generators with Balanced Gray Codes},
551 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
553 address = {Vienna, Austria},
562 @INPROCEEDINGS{nusmv02,
563 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
564 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
565 Sebastiani and Armando Tacchella},
566 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
570 crossref = {DBLP:conf/cav/2002}
574 author = {Nishanth Chandrasekaran},
575 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
580 Author = "Gastin, P. and Oddoux, D.",
581 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
582 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
583 Publisher = "Springer",
590 @inproceedings{cg04:np,
592 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
593 title = {Analyse d'atteignabilit\'e d\'eductive},
594 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
596 editor = {Julliand, Jacques},
597 address = {Besan\c{c}on, France},
606 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
607 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
608 journal = {Journal of the Brazilian Computer Society (JBCS)},
612 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
615 note = {ISSN 0104-6500},
620 @inproceedings{cddg+04:ip,
622 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
624 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
625 title = {Proving and Debugging Set-Based Specifications},
626 booktitle = {WMF'03 proceedings},
627 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
630 editor = {A. Cavalcanti and P. Machado},
631 address = {Campina Grande, Brazil},
632 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
639 @inproceedings{cdgr04:onp,
641 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
642 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
644 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
645 address = {Besan\c{c}on, France},
648 editor = {Julliand, Jacques},
649 note = {Session outils},
654 @INPROCEEDINGS{CGK05,
655 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
656 title = {A uniform deductive approach for parameterized protocol safety},
660 bibsource = {DBLP, http://dblp.uni-trier.de},
661 crossref = {DBLP:conf/kbse/2005},
662 ee = {http://doi.acm.org/10.1145/1101908.1101971}
665 @INPROCEEDINGS{abcvs05,
666 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
667 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
669 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
673 address = {Guelph, Canada},
675 note = {ISSN 1492-8760}
679 author = {Bahi, J. M.},
680 title = {Boolean totally asynchronous iterations},
688 author = {Bahi, J. M. and Contassot-Vivier, S.},
689 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
699 author = {Bahi, J. M. and Contassot-Vivier, S.},
700 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
705 pages = {1353--1363},
710 @inproceedings{bcgr11:ip,
712 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
715 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
716 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
717 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
721 doi = {10.1007/978-3-642-22953-4_11},
722 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
723 address = {Oslo, Norway},
731 @techreport{BCVC10:ir,
732 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
733 title = {Convergence Results of Combining Synchronism and Asynchronism for
734 Discrete-State Discrete-Time Dynamic Network},
736 institution = {LIFC - Laboratoire d’{I}nformatique de
737 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
738 type = {Research Report},
739 number = {RR2010-02},
740 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
744 @techreport{Cou10:ir,
745 author = {Couchot, J.-F.},
746 title = {Formal {C}onvergence {P}roof for {D}iscrete
747 {D}ynamical {S}ystems},
748 institution = {LIFC - Laboratoire d’{I}nformatique de
749 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
750 type = {Research Report},
751 number = {RR2010-03},
752 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
760 author = {Bahi, J. M. and Michel, C.},
761 title = {Convergence of discrete asynchronous iterations},
762 journal = {International Journal Computer Mathematics},
769 author = {Bahi, J. M. and Michel, C.},
770 title = {Simulations of asynchronous evolution of discrete systems},
771 journal = {Simulation Practice and Theory},
779 author = {G\'{e}rard M. Baudet},
780 title = {Asynchronous Iterative Methods for Multiprocessors},
786 doi = {http://doi.acm.org/10.1145/322063.322067},
792 title = {Parallel and distributed computation: numerical methods},
793 publisher = prenticeHall,
795 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
796 isbn = {0-13-648700-9}
800 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
801 title = {The software model checker Blast},
809 @INPROCEEDINGS{LeCun85,
811 title = {A learning scheme for threshold networks},
812 booktitle = {Cognitiva'95},
815 address = {Paris, France}
819 author = {Jeffrey L. Elman},
820 title = {Finding Structure in Time},
821 journal = {Cognitive Science},
828 author = {Andreas Frommer and Daniel B. Szyld},
829 title = {On asynchronous iterations},
835 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
841 author = {Goles Ch., E. and Salinas,L.},
842 title = {Comparison between parallel and serial dynamics of Boolean networks},
851 title = {The SPIN Model Checker: Primer and Reference Manual},
852 publisher = {Addison-Wesley, Pearson Education},
854 author = {Gerard J. Holzmann}
858 author = {Shih M.-H. and Ho, J.-L.},
859 title = {Solution of the Boolean Markus-Yamabe Problem},
860 journal = advapplMath,
868 author = {Adrien Richard},
869 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
871 journal = advapplMath,
880 author = {Adrien Richard and Jean-Paul Comet},
881 title = {Necessary conditions for multistationarity in discrete dynamical
883 journal = discreteapplMath,
886 pages = {2403--2413},
893 title = {Les syst\`emes dynamiques discrets},
894 publisher = springer,
896 author = {F. Robert},
898 series = {Math\'ematiques et Applications}
902 author = {Shih, M.-H. and Dong J.-L.},
903 title = {A combinatorial analogue of the Jacobian problem in automata networks},
904 journal = advapplMath,
913 author = {Thomas, R.},
914 title = {Boolean Formalization of Genetic Control Circuits},
922 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
923 title = {Absence of Cycles in Symmetric Neural Networks},
929 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
932 @PROCEEDINGS{DBLP:conf/cav/2002,
933 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
934 Denmark, July 27-31, 2002, Proceedings},
936 editor = {Ed Brinksma and Kim Guldstrand Larsen},
939 publisher = springer,
943 @PROCEEDINGS{DBLP:conf/kbse/2005,
944 title = {20th IEEE/ACM International Conference on Automated Software Engineering
945 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
947 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
949 bibsource = {DBLP, http://dblp.uni-trier.de},
954 author = {Ben-Ari, Mordechai},
956 title = {Principles of the Spin Model Checker},
957 isbn = {1846287693, 9781846287695}},
958 publisher = springer,
962 @INPROCEEDINGS{Wei97,
963 author = {Weise,Carsten},
964 title = {An incremental formal semantics for {PROMELA}},
965 booktitle = {SPIN97, the Third SPIN Workshop},
970 @PHDTHESIS{Couchot-PhD06,
971 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
972 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
975 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
976 TYPE = {Th\`ese de {D}octorat},
981 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
982 Page, M. and Tewfik, S. and Geiselmann, J.},
983 title = {Qualitative simulation of genetic regulatory networks
984 using piecewise-linear models},
985 journal = {Bull. Math. Biol.},
997 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
998 title = {A Fruitful Application of Formal Methods to Biological
999 Regulatory Networks: Extending {T}homas' Asynchronous
1000 Logical Approach with Temporal Logic},
1001 journal = {J. Theor. Biol.},
1011 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1012 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1013 journal = {Biosystems},
1025 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1027 title = {Genetic Network Analyzer: qualitative simulation
1028 of genetic regulatory networks.},
1029 journal = {Bioinformatics},
1037 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1038 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1039 journal = {Genes, Genomes and Genomics},
1051 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1052 title = {Analysing formal models of genetic regulatory networks with delays},
1053 journal = {Int. J. Bioinformatics Res. Appl.},
1059 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1060 publisher = {Inderscience Publishers},
1061 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1064 author = {Richard, A.},
1065 title = {Local negative circuits and fixed points in Boolean networks},
1066 institution = {preprint arXiv number 0910.0750},
1079 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1080 title = {Graphic requirement for multistability and attractive cycles in a
1081 Boolean dynamical framework},
1082 journal = {Advances in Applied Mathematics},
1088 timestamp = {2009.02.05}
1091 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1092 author = {Jacques M. Bahi and
1093 Sylvain Contassot-Vivier and
1097 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1098 in Heterogeneous Environments},
1099 booktitle = {ICANN (2)},
1102 ee = {http://dx.doi.org/10.1007/11840930_81},
1103 crossref = {DBLP:conf/icann/2006-2},
1104 bibsource = {DBLP, http://dblp.uni-trier.de}
1107 @proceedings{DBLP:conf/icann/2006-2,
1108 editor = {Stefanos D. Kollias and
1109 Andreas Stafylopatis and
1112 title = {Artificial Neural Networks - ICANN 2006, 16th International
1113 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1115 booktitle = {ICANN (2)},
1116 publisher = {Springer},
1117 series = {Lecture Notes in Computer Science},
1120 isbn = {3-540-38871-0},
1121 bibsource = {DBLP, http://dblp.uni-trier.de}
1128 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1130 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1131 publisher = {Eyrolles},
1149 title = {An Introduction to Chaotic Dynamical Systems},
1150 publisher = {Redwood City: Addison-Wesley},
1152 author = {R. L. Devaney},
1155 timestamp = {27/01/2008}
1161 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1163 classement = {ACLI},
1164 impact-factor ={1.255},
1165 isi-acro = {MECHATRONICS},
1166 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1167 title = {Active {MEMS}-based flow control using artificial neural network},
1168 journal = {Mechatronics},
1172 doi = {10.1016/j.mechatronics.2013.02.010},
1173 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1174 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1175 publisher = {Elsevier},
1178 note = {Available online. Paper version to appear},
1183 @inproceedings{cds12:ip,
1185 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1187 classement = {ACTI},
1188 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1189 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1190 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1192 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1193 address = {Besan\c{c}on, France},
1194 publisher = {IEEE CPS},
1203 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1205 classement = {ACLI},
1206 impact-factor ={2.081},
1208 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1209 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1210 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1213 pages = {013122-1 -- 013122-9},
1214 doi = {10.1063/1.3685524},
1215 url = {http://dx.doi.org/10.1063/1.3685524},
1216 publisher = {American Institute of Physics},
1224 @inproceedings{bgs11:ip,
1226 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1228 classement = {ACTI},
1229 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1230 title = {Building a Chaotic Proven Neural Network},
1231 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1232 address = {Maldives, Maldives},
1238 author = {Bahi, Jacques M. and Guyeux, Christophe},
1239 title = {Hash Functions Using Chaotic Iterations},
1240 journal = {Journal of Algorithms \& Computational Technology},
1245 classement = {ACLNI},
1246 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1248 impact-factor = {#},
1255 @PHDTHESIS{GuyeuxThese10,
1256 author = {Christophe Guyeux},
1257 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1258 en s\'{e}curit\'{e} informatique},
1259 school = {Universit\'{e} de Franche-Comt\'{e}},
1261 owner = {christophe},
1262 timestamp = {2010.12.21}
1265 @INPROCEEDINGS{gfb10:ip,
1266 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1267 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1268 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1269 Multimedia Signal Processing},
1272 address = {Darmstadt, Germany},
1274 classement = {ACTI},
1275 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1282 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1283 title = {Topological entropy},
1284 journal = {Transactions of the American Mathematical Society},
1289 timestamp = {2008.05.29}
1293 author = {Rufus Bowen},
1294 title = {Entropy for group endomorphisms and homogeneous spaces},
1295 journal = {Transactions of the American Mathematical Society},
1300 timestamp = {15/02/2008}
1303 @article{10.1109/CIMSiM.2010.36,
1304 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1305 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1306 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1310 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1311 publisher = {IEEE Computer Society},
1312 address = {Los Alamitos, CA, USA},
1314 @article{10.1109/ICME.2003.1221665,
1315 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1316 title = {Neural network based steganalysis in still images},
1317 journal ={Multimedia and Expo, IEEE International Conference on},
1321 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1322 publisher = {IEEE Computer Society},
1323 address = {Los Alamitos, CA, USA},
1326 @ARTICLE{Sullivan06steganalysisfor,
1327 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1328 title = {Steganalysis for Markov cover data with applications to images},
1329 journal = {IEEE Transactions on Information Forensics and Security},
1338 author = "Gray, Frank",
1339 title = "Pulse code communication",
1340 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1345 @INPROCEEDINGS{guyeux10ter,
1346 author = {Bahi, Jacques M. and Guyeux, Christophe},
1347 title = {A new chaos-based watermarking algorithm},
1348 booktitle = {SECRYPT'10, International Conference on Security
1352 address = {Athens, Greece},
1354 publisher = {SciTePress},
1355 classement = {ACTI},
1356 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1362 @inproceedings{Qiao:2009:SM:1704555.1704664,
1363 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1364 title = {Steganalysis of MP3Stego},
1365 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1366 series = {IJCNN'09},
1368 location = {Atlanta, Georgia, USA},
1369 pages = {2723--2728},
1371 publisher = {IEEE Press}
1374 @inproceedings{CouchotD07IFM,
1376 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1379 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1380 title = {Guiding the Correction of Parameterized Specifications},
1381 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1385 publisher = {Springer},
1386 doi = {10.1007/978-3-540-73210-5_10},
1387 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1388 address = {Oxford, UK},
1394 @inproceedings{couchot07FTP,
1398 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1399 title = {A Graph-based Strategy for the Selection of Hypotheses},
1400 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1401 address = {Liverpool, UK},
1408 @inproceedings{cgs09:ip,
1410 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1412 classement = {ACTI},
1413 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1414 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1415 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1416 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1417 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1418 publisher = {ACM Press},
1420 url = {http://arxiv.org/abs/0907.1357},
1421 otherUrl = {http://hal.inria.fr/inria-00402204},
1422 address = {Grenoble, France},
1423 editor = {Hassen Sa\"{i}di and N. Shankar},
1430 @inproceedings{couchot07cade,
1434 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1435 title = {Handling Polymorphism in Automated Deduction},
1436 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1440 publisher = {Springer},
1441 isbn = {978-3-540-73594-6},
1442 doi = {10.1007/978-3-540-73595-3_18},
1443 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1444 address = {Bremen, Germany},
1456 @inproceedings{BCDG07,
1458 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1459 equipe = {vesontio},
1460 classement = {ACTI},
1461 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1462 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1463 booktitle = {B'2007, the 7th Int. B Conference},
1467 publisher = {Springer},
1468 doi = {10.1007/11955757_10},
1469 url = {http://dx.doi.org/10.1007/11955757_10},
1470 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1471 address = {Besancon, France},
1479 @article{byrd1995limited,
1480 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1481 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1482 journal = {SIAM J. Sci. Comput.},
1483 issue_date = {Sept. 1995},
1489 pages = {1190--1208},
1491 url = {http://dx.doi.org/10.1137/0916069},
1492 doi = {10.1137/0916069},
1494 publisher = {Society for Industrial and Applied Mathematics},
1495 address = {Philadelphia, PA, USA},
1496 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1499 @article{ANU:1770520,
1500 author = {Powell,M. J. D.},
1501 title = {Direct search algorithms for optimization calculations},
1502 journal = {Acta Numerica},
1509 doi = {10.1017/S0962492900002841},
1510 URL = {http://journals.cambridge.org/article_S0962492900002841},
1516 journal={The Journal of Supercomputing},
1519 doi={10.1007/s11227-010-0500-5},
1520 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1521 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1522 publisher={Springer US},
1523 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1524 author={Wang, Honggang},
1530 author={Yifeng He and Lee, I. and Ling Guan},
1531 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1532 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1537 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1538 doi={10.1109/TCSVT.2009.2017411},
1542 author={Palomar, D.P. and Mung Chiang},
1543 journal={Selected Areas in Communications, IEEE Journal on},
1544 title={A tutorial on decomposition methods for network utility maximization},
1549 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1550 doi={10.1109/JSAC.2006.879350},
1555 journal={EURASIP Journal on Information Security},
1559 doi={10.1186/1687-417X-2014-1},
1560 title={Universal distortion function for steganography in an arbitrary domain},
1561 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1562 publisher={Springer International Publishing},
1563 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1571 @inproceedings{conf/wifs/HolubF12,
1572 added-at = {2013-01-23T00:00:00.000+0100},
1573 author = {Holub, Vojtech and Fridrich, Jessica J.},
1574 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1576 crossref = {conf/wifs/2012},
1577 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1578 interhash = {cbef658a6868216eef585dd759ae0668},
1579 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1580 isbn = {978-1-4673-2285-0},
1584 timestamp = {2013-01-23T00:00:00.000+0100},
1585 title = {Designing steganographic distortion using directional filters.},
1586 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1590 @proceedings{conf/wifs/2012,
1591 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1592 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1593 publisher = {{IEEE}},
1595 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1596 isbn = {978-1-4673-2285-0},
1597 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1598 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1599 bibsource = {dblp computer science bibliography, http://dblp.org}
1603 @article{FillerJF11,
1604 author = {Tom{\'a}s Filler and
1606 Jessica J. Fridrich},
1607 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1609 journal = {IEEE Transactions on Information Forensics and Security},
1614 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1615 bibsource = {DBLP, http://dblp.uni-trier.de}
1618 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1619 editor = {Ira S. Moskowitz},
1620 author = {Shelby Pereira and
1621 Sviatoslav Voloshynovskiy and
1623 St{\'e}phane Marchand-Maillet and
1625 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1626 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1627 title = {Second Generation Benchmarking and Application Oriented
1632 publisher = springer,
1633 address = springer_loc,
1639 @inproceedings{DBLP:conf/ih/Westfeld01,
1640 added-at = {2011-06-28T00:00:00.000+0200},
1641 author = {Westfeld, Andreas},
1642 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1643 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1644 editor = {Ira S. Moskowitz},
1646 publisher = springer,
1647 address = springer_loc,
1650 title = {F5-A Steganographic Algorithm.},
1659 @article{Chang20101286,
1660 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1661 journal = "Digital Signal Processing",
1664 pages = "1286 - 1307",
1668 doi = "10.1016/j.dsp.2009.11.005",
1669 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1670 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1671 keywords = "Security",
1672 keywords = "Wet paper coding",
1673 keywords = "Steganography",
1674 keywords = "Indicator",
1675 keywords = "Fuzzy edge detector"
1680 @article{Hu:2007:HPE:1282866.1282944,
1681 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1682 title = {A high performance edge detector based on fuzzy inference rules},
1683 journal = {Inf. Sci.},
1684 issue_date = {November, 2007},
1690 pages = {4768--4784},
1692 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1693 doi = {10.1016/j.ins.2007.04.001},
1695 publisher = {Elsevier Science Inc.},
1696 address = {New York, NY, USA},
1697 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1701 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1702 author = {Sorina Dumitrescu and
1704 editor = {Ahmet M. Eskicioglu and
1705 Jessica J. Fridrich and
1707 title = {LSB steganalysis based on high-order statistics},
1708 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1709 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1712 address = {New York, NY, USA},
1715 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1716 bibsource = {DBLP, http://dblp.uni-trier.de}
1719 @inproceedings{DBLP:conf/ih/Ker05,
1720 author = {Andrew D. Ker},
1721 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1722 editor = {Mauro Barni and
1723 Jordi Herrera-Joancomart\'{\i} and
1724 Stefan Katzenbeisser and
1725 Fernando P{\'e}rez-Gonz{\'a}lez},
1726 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1727 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1730 ee = {http://dx.doi.org/10.1007/11558859_22},
1731 publisher = springer,
1732 address = springer_loc,
1739 @inproceedings{FK12,
1740 editor = {Matthias Kirchner and
1742 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1743 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1744 author = {Jessica J. Fridrich and
1746 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1750 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1752 publisher = springer,
1753 address = springer_loc,
1755 bibsource = {DBLP, http://dblp.uni-trier.de}
1759 @article{DBLP:journals/tsp/DumitrescuWW03,
1760 added-at = {2012-02-06T00:00:00.000+0100},
1761 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1762 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1763 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1764 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1765 intrahash = {556caad9b61980d3458885153a52321c},
1766 journal = {IEEE Transactions on Signal Processing},
1769 pages = {1995-2007},
1770 timestamp = {2012-02-06T00:00:00.000+0100},
1771 title = {Detection of LSB steganography via sample pair analysis.},
1772 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1780 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1781 editor = {Nicolas D. Georganas and
1782 Radu Popescu-Zeletin},
1783 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1784 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1786 author = {Jessica J. Fridrich and
1789 title = {Reliable detection of LSB steganography in color and grayscale
1793 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1795 address = {New York, NY, USA},
1797 bibsource = {DBLP, http://dblp.uni-trier.de}
1804 @inproceedings{DBLP:conf/ih/PevnyFB10,
1805 author = {Tom{\'a}s Pevn{\'y} and
1806 Tom{\'a}s Filler and
1808 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1810 editor = {Rainer B{\"o}hme and
1811 Philip W. L. Fong and
1812 Reihaneh Safavi-Naini},
1813 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1814 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1819 publisher = springer,
1820 address = springer_loc,
1823 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1824 bibsource = {DBLP, http://dblp.uni-trier.de}
1833 author = {Tom{\'a}s Pevn{\'y} and
1834 Tom{\'a}s Filler and
1837 title = {Break Our Steganographic System},
1838 OPThowpublished = {},
1841 note = {Available at \url{http://www.agents.cz/boss/}},
1845 @proceedings{DBLP:conf/ih/2010,
1846 editor = {Rainer B{\"o}hme and
1847 Philip W. L. Fong and
1848 Reihaneh Safavi-Naini},
1849 title = {Information Hiding - 12th International Conference, IH 2010,
1850 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1852 booktitle = {Information Hiding},
1853 publisher = springer,
1854 address = springer_loc,
1858 isbn = {978-3-642-16434-7},
1859 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1860 bibsource = {DBLP, http://dblp.uni-trier.de}
1864 @article{DBLP:journals/eswa/ChenCL10,
1865 added-at = {2010-07-21T15:44:10.000+0200},
1866 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1867 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1868 date = {2010-05-03},
1869 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1870 interhash = {bc34a5f04661fee24ee62c39e76361be},
1871 intrahash = {28889a4ab329da28559f0910469f054b},
1872 journal = {Expert Systems with Applications},
1875 pages = {3292-3301},
1876 timestamp = {2010-07-21T15:44:10.000+0200},
1877 title = {High payload steganography mechanism using hybrid edge detector.},
1878 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1883 @article{DBLP:journals/tifs/FillerJF11,
1884 added-at = {2011-09-29T00:00:00.000+0200},
1885 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1886 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1887 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1888 interhash = {b27d23ed0c9936d568e16c51378abccd},
1889 intrahash = {50e43c05a74eec17524b3df8db442da5},
1890 journal = {IEEE Transactions on Information Forensics and Security},
1894 timestamp = {2011-09-29T00:00:00.000+0200},
1895 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1896 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1904 @inproceedings{DBLP:conf/ih/KimDR06,
1905 added-at = {2007-09-20T00:00:00.000+0200},
1906 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1907 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1908 booktitle = {Information Hiding},
1909 crossref = {DBLP:conf/ih/2006},
1910 date = {2007-09-20},
1911 description = {dblp},
1912 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1913 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1914 interhash = {399aab122b39cfd6f6e951a1b276c786},
1915 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1916 isbn = {978-3-540-74123-7},
1920 publisher = springer,
1921 address = springer_loc,
1923 timestamp = {2007-09-20T00:00:00.000+0200},
1924 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1925 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1931 @proceedings{DBLP:conf/ih/2006,
1932 editor = {Jan Camenisch and
1933 Christian S. Collberg and
1936 title = {Information Hiding, 8th International Workshop, IH 2006,
1937 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1938 booktitle = {Information Hiding},
1939 publisher = springer,
1940 address = springer_loc,
1944 isbn = {978-3-540-74123-7},
1945 bibsource = {DBLP, http://dblp.uni-trier.de}
1950 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1951 author = {Jessica J. Fridrich and
1952 Tom{\'a}s Pevn{\'y} and
1954 title = {Statistically undetectable jpeg steganography: dead ends
1955 challenges, and opportunities},
1957 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1958 editor = {Deepa Kundur and
1959 Balakrishnan Prabhakaran and
1961 Jessica J. Fridrich},
1962 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1963 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1965 address = {New York, NY, USA},
1968 isbn = {978-1-59593-857-2},
1969 bibsource = {DBLP, http://dblp.uni-trier.de}
1975 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1976 editor = {Nasir D. Memon and
1978 Adnan M. Alattar and
1980 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1981 Electronic Imaging Symposium, San Jose, CA, USA, January
1982 18-20, 2010, Proceedings},
1983 author = {Tom{\'a}s Filler and
1985 Jessica J. Fridrich},
1986 title = {Minimizing embedding impact in steganography using trellis-coded
1990 ee = {http://dx.doi.org/10.1117/12.838002},
1991 bibsource = {DBLP, http://dblp.uni-trier.de},
1995 series = {SPIE Proceedings},
2006 @proceedings{DBLP:conf/mediaforensics/2010,
2007 editor = {Nasir D. Memon and
2009 Adnan M. Alattar and
2011 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2012 Electronic Imaging Symposium, San Jose, CA, USA, January
2013 18-20, 2010, Proceedings},
2014 booktitle = {Media Forensics and Security},
2017 series = {SPIE Proceedings},
2020 isbn = {978-0-8194-7934-1},
2021 bibsource = {DBLP, http://dblp.uni-trier.de}
2024 @article{DBLP:journals/corr/abs-1112-5239,
2025 author = {Jacques M. Bahi and
2026 Rapha{\"e}l Couturier and
2027 Christophe Guyeux and
2028 Pierre-Cyrille H{\'e}am},
2029 title = {Efficient and Cryptographically Secure Generation of Chaotic
2030 Pseudorandom Numbers on GPU},
2032 volume = {abs/1112.5239},
2034 ee = {http://arxiv.org/abs/1112.5239},
2035 bibsource = {DBLP, http://dblp.uni-trier.de}
2039 author = {Ponomarenko, Nikolay},
2040 title = {PSNR-HVS-M page},
2041 OPThowpublished = {},
2044 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2050 author = {Bovik, Alan C.},
2051 title = {BIQI page},
2052 OPThowpublished = {},
2055 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2060 @InProceedings{PSECAL07,
2061 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2062 title = {On between-coefficient contrast masking of DCT basis functions},
2063 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2066 editor = {Li,Baoxin},
2072 OPTorganization = {},
2080 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2081 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2082 journal = {IEEE Signal Processing Letters},
2093 @inproceedings{DBLP:conf/crypto/ShubBB82,
2094 author = {Lenore Blum and
2097 title = {Comparison of Two Pseudo-Random Number Generators},
2098 editor = {David Chaum and
2099 Ronald L. Rivest and
2101 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2102 Barbara, California, USA, August 23-25, 1982},
2104 bibsource = {DBLP, http://dblp.uni-trier.de},
2105 publisher = {Plenum Press},
2106 address={New York, NY, USA},
2109 bibsource = {DBLP, http://dblp.uni-trier.de}
2113 @inproceedings{Blum:1985:EPP:19478.19501,
2114 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2115 Barbara, California, USA, August 19-22, 1984, Proceedings},
2116 author = {Manuel Blum and
2118 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2119 Which Hides All Partial Information},
2123 editor = {G. R. Blakley and
2125 publisher = springer,
2126 address = springer_loc,
2133 @article{DBLP:journals/ejisec/FontaineG07,
2134 author = {Caroline Fontaine and
2136 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2137 journal = {EURASIP Journal on Information Security},
2142 ee = {http://dx.doi.org/10.1155/2007/13801},
2143 bibsource = {DBLP, http://dblp.uni-trier.de}
2147 @article{Luo:2010:EAI:1824719.1824720,
2148 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2149 title = {Edge adaptive image steganography based on LSB matching revisited},
2150 journal = {IEEE Transactions on Information Forensics and Security},
2158 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2159 doi = {10.1109/TIFS.2010.2041812},
2161 publisher = {IEEE Press},
2162 address = {Piscataway, NJ, USA},
2163 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2166 @article{Mielikainen06,
2167 author = {Mielikainen, J.},
2168 title = {LSB Matching Revisited},
2169 journal = {IEEE Signal Processing Letters},
2184 @article{Liu:2008:FMP:1284917.1285196,
2185 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2186 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2187 journal = {Pattern Recogn.},
2188 issue_date = {January, 2008},
2196 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2197 doi = {10.1016/j.patcog.2007.06.005},
2199 publisher = {Elsevier Science Inc.},
2200 address = {New York, NY, USA},
2201 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2206 @InProceedings{LHS08,
2207 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2208 title = {Textural features based universal steganalysis},
2211 booktitle = {Proc. SPIE 6819},
2222 OPTorganization = {},
2229 @InProceedings{KF11,
2230 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2231 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2234 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2238 pages = {78800L-78800L-13},
2247 OPTorganization = {},
2253 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2254 author = {Jan Kodovský and
2256 Jessica J. Fridrich},
2257 title = {Modern steganalysis can detect YASS.},
2258 booktitle = {Media Forensics and Security},
2261 ee = {http://dx.doi.org/10.1117/12.838768}
2264 @article{DBLP:journals/tifs/KodovskyFH12,
2265 author = {Jan Kodovsk{\'y} and
2266 Jessica J. Fridrich and
2268 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2269 journal = {IEEE Transactions on Information Forensics and Security},
2274 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2275 bibsource = {DBLP, http://dblp.uni-trier.de}
2280 @article{Fillatre:2012:ASL:2333143.2333587,
2281 author = {Fillatre, Lionel},
2282 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2283 journal = {IEEE Transactions on Signal Processing},
2291 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2292 doi = {10.1109/TSP.2011.2174231},
2294 publisher = {IEEE Press},
2295 address = {Piscataway, NJ, USA},
2299 @inproceedings{Tyan1993,
2300 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2301 address = ieecs_loc,
2303 author = {Tyan, C. Y. and Wang, P. P.},
2304 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2305 citeulike-article-id = {7936501},
2306 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2308 posted-at = {2010-10-01 17:27:48},
2311 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2317 @article{Canny:1986:CAE:11274.11275,
2318 author = {Canny, J},
2319 title = {A Computational Approach to Edge Detection},
2320 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2321 issue_date = {June 1986},
2329 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2330 doi = {10.1109/TPAMI.1986.4767851},
2332 publisher = {IEEE Computer Society},
2333 address = {Washington, DC, USA},
2334 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2338 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2339 author = {Jessica J. Fridrich and
2340 Jan Kodovsk{\'y} and
2343 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2345 booktitle = {Information Hiding},
2348 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2349 crossref = {DBLP:conf/ih/2011},
2350 bibsource = {DBLP, http://dblp.uni-trier.de}
2352 @proceedings{DBLP:conf/ih/2011,
2353 editor = {Tom{\'a}s Filler and
2354 Tom{\'a}s Pevn{\'y} and
2357 title = {Information Hiding - 13th International Conference, IH 2011,
2358 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2360 booktitle = {Information Hiding},
2361 publisher = springer,
2362 address = springer_loc,
2366 isbn = {978-3-642-24177-2},
2367 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2368 bibsource = {DBLP, http://dblp.uni-trier.de}
2371 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2372 author = {Jessica J. Fridrich},
2373 title = {Modern Trends in Steganography and Steganalysis},
2377 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2378 crossref = {DBLP:conf/iwdw/2011},
2379 bibsource = {DBLP, http://dblp.uni-trier.de}
2381 @proceedings{DBLP:conf/iwdw/2011,
2382 editor = {Yun-Qing Shi and
2383 Hyoung-Joong Kim and
2384 Fernando P{\'e}rez-Gonz{\'a}lez},
2385 title = {Digital Forensics and Watermarking - 10th International
2386 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2387 2011, Revised Selected Papers},
2389 publisher = springer,
2390 address = springer_loc,
2394 isbn = {978-3-642-32204-4},
2395 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2396 bibsource = {DBLP, http://dblp.uni-trier.de}
2402 @article{MCErlang07,
2403 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2404 title = {McErlang: a model checker for a distributed functional programming language},
2405 journal = {SIGPLAN Not.},
2414 @inproceedings{Bogor03,
2416 Matthew B. Dwyer and
2418 title = {Bogor: an extensible and highly-modular software model checking
2420 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2421 of Software Engineering 2003},
2429 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2430 title = {On Devaney's Definition of Chaos},
2431 journal = {Amer. Math. Monthly},
2437 timestamp = {27/01/2008}
2440 @article{Crook2007267,
2441 title = "Pattern recall in networks of chaotic neurons",
2442 journal = "Biosystems",
2445 pages = "267 - 274",
2448 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2449 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2451 keywords = "Spiking neural network"
2455 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2456 title = {A novel Hash algorithm construction based on chaotic neural network},
2457 journal = {Neural Computing and Applications},
2460 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2463 keyword = {Computer Science},
2464 publisher = {Springer London}
2468 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2469 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2475 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2476 doi={10.1109/TCE.2004.1309431},
2479 @article{Zhang2005759,
2480 title = "An image encryption approach based on chaotic maps",
2481 journal = "Chaos, Solitons \& Fractals",
2484 pages = "759 - 765",
2488 doi = "10.1016/j.chaos.2004.09.035",
2489 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2492 @article{Lian20091296,
2493 title = "A block cipher based on chaotic neural networks",
2494 journal = "Neurocomputing",
2497 pages = "1296 - 1301",
2500 author = "Shiguo Lian",
2501 keywords = "Neural network",
2503 keywords = "Security",
2504 keywords = "Block cipher",
2505 keywords = "Image encryption"
2509 author = {George Cybenko},
2510 title = {Approximation by Superpositions of a Sigmoidal function},
2511 journal = {Mathematics of Control, Signals and Systems},
2518 @article{DBLP:journals/nn/HornikSW89,
2519 author = {Kurt Hornik and
2520 Maxwell B. Stinchcombe and
2522 title = {Multilayer feedforward networks are universal approximators},
2523 journal = {Neural Networks},
2528 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2529 bibsource = {DBLP, http://dblp.uni-trier.de}
2532 @article{dalkiran10,
2533 author = {Ilker Dalkiran and Kenan Danisman},
2534 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2535 title = {Artificial neural network based chaotic generator for cryptology},
2543 @article{springerlink:10.1007/s00521-010-0432-2,
2544 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2545 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2546 title = {A novel Hash algorithm construction based on chaotic neural network},
2547 journal = {Neural Computing and Applications},
2548 publisher = {Springer},
2550 keyword = {Computer Science},
2556 @article{Feder2009NTB,
2557 author = {Feder, Tom\'{a}s and Subi, Carlos},
2558 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2559 journal = {Inf. Process. Lett.},
2560 issue_date = {February, 2009},
2568 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2569 doi = {10.1016/j.ipl.2008.10.015},
2571 publisher = {Elsevier North-Holland, Inc.},
2572 address = {Amsterdam, The Netherlands, The Netherlands},
2573 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2579 author={Zanten, A.~J.~van and Suparta, I.~N.},
2580 title={ Totally balanced and exponentially balanced Gray codes},
2581 journal={Discrete Analysis and Operational Research},
2589 @book{LevinPeresWilmer2006,
2590 added-at = {2010-01-19T17:51:27.000+0100},
2591 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2592 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2593 interhash = {61354795a6accb6407bfdbf04753a683},
2594 intrahash = {097dc4d1d0e412b2444f540b04110797},
2595 keywords = {markovchains probabilitytheory textbook},
2596 publisher = {American Mathematical Society},
2597 timestamp = {2010-01-19T17:51:27.000+0100},
2598 title = {{Markov chains and mixing times}},
2599 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2604 author = {M. Mitzenmacher and Eli Upfal},
2606 title = {Probability and Computing},
2607 publisher = {Cambridge University Press},
2613 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2616 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2617 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2618 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},