1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 @inproceedings{bcg11:ip,
8 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
11 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
12 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
13 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
15 address = {Luxembourg, Luxembourg},
18 note = {Best paper award},
24 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
29 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
30 title = {Quality analysis of a chaotic proven keyed hash function},
31 journal = {International Journal On Advances in Internet Technology},
43 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
48 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
49 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
50 journal = {Annals of Telecommunications},
51 doi = {10.1007/s12243-015-0466-7},
52 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
53 publisher = {Springer},
55 note = {Available online. Paper version to appear},
59 @inproceedings{fccg15:ip,
61 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
64 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
65 title = {Steganalyzer performances in operational contexts},
66 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
68 address = {Adelaide, Australia},
76 @inproceedings{bcfg12a:ip,
78 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
81 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
82 title = {Application of Steganography for Anonymity through the Internet},
83 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
85 url = {http://arxiv.org/abs/1202.5302v1},
86 address = {Venice, Italy},
93 @inproceedings{bcfg+13:ip,
95 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
98 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
99 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
100 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
102 doi = {10.1109/IIH-MSP.2013.141},
103 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
104 address = {Beijing, China},
110 @inproceedings{bcfg12b:ip,
112 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
115 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
116 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
117 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
119 address = {Venice, Italy},
129 @inproceedings{bcg11b:ip,
131 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
134 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
135 title = {Steganography: a Class of Algorithms having Secure Properties},
136 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
138 address = {Dalian, China},
147 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
150 impact-factor ={1.363},
151 isi-acro = {COMPUT J},
152 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
153 title = {Steganography: a class of secure and robust algorithms},
154 journal = {The Computer Journal},
158 doi = {10.1093/comjnl/bxr116},
159 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
160 publisher = {Oxford University Press},
166 @inproceedings{bcgw11:ip,
168 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
171 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
172 title = {Class of Trustworthy Pseudo Random Number Generators},
173 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
175 address = {Luxembourg, Luxembourg},
183 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
186 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
187 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
188 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
194 @inproceedings{aagp+15:ip,
196 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
198 classement = {ACTIN},
199 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
200 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
201 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
203 address = {Naples, Italy},
211 @inproceedings{acgm+14:ij,
213 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
216 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
217 title = {Finding the Core-Genes of Chloroplasts},
218 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
220 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
222 doi = {10.7763/IJBBB.2014.V4.371},
223 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
224 address = {Copenhagen, Denmark},
234 @inproceedings{akgcs+14:oip,
236 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
239 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
240 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
241 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
242 address = {Belfast, United Kingdom},
246 note = {Short paper},
251 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
254 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
255 title = {Finding the core-genes of Chloroplast Species},
256 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
266 @PhdThesis{guyeuxphd,
267 author = {Guyeux, Christophe},
268 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
269 type = {Th\`ese de {D}octorat},
270 school = {LIFC, Universit\'e de Franche-Comt\'e},
272 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
273 month = {13 décembre},
278 @inproceedings{chgw+14:oip,
280 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
282 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
283 title = {Pseudorandom Number Generators with Balanced Gray Codes},
284 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
286 address = {Vienna, Austria},
295 @INPROCEEDINGS{nusmv02,
296 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
297 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
298 Sebastiani and Armando Tacchella},
299 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
303 crossref = {DBLP:conf/cav/2002}
307 author = {Nishanth Chandrasekaran},
308 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
313 Author = "Gastin, P. and Oddoux, D.",
314 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
315 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
316 Publisher = "Springer",
323 @inproceedings{cg04:np,
325 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
326 title = {Analyse d'atteignabilit\'e d\'eductive},
327 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
329 editor = {Julliand, Jacques},
330 address = {Besan\c{c}on, France},
339 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
340 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
341 journal = {Journal of the Brazilian Computer Society (JBCS)},
345 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
348 note = {ISSN 0104-6500},
353 @inproceedings{cddg+04:ip,
355 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
357 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
358 title = {Proving and Debugging Set-Based Specifications},
359 booktitle = {WMF'03 proceedings},
360 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
363 editor = {A. Cavalcanti and P. Machado},
364 address = {Campina Grande, Brazil},
365 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
372 @inproceedings{cdgr04:onp,
374 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
375 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
377 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
378 address = {Besan\c{c}on, France},
381 editor = {Julliand, Jacques},
382 note = {Session outils},
387 @INPROCEEDINGS{CGK05,
388 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
389 title = {A uniform deductive approach for parameterized protocol safety},
393 bibsource = {DBLP, http://dblp.uni-trier.de},
394 crossref = {DBLP:conf/kbse/2005},
395 ee = {http://doi.acm.org/10.1145/1101908.1101971}
398 @INPROCEEDINGS{abcvs05,
399 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
400 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
402 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
406 address = {Guelph, Canada},
408 note = {ISSN 1492-8760}
412 author = {Bahi, J. M.},
413 title = {Boolean totally asynchronous iterations},
421 author = {Bahi, J. M. and Contassot-Vivier, S.},
422 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
432 author = {Bahi, J. M. and Contassot-Vivier, S.},
433 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
438 pages = {1353--1363},
443 @inproceedings{bcgr11:ip,
445 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
448 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
449 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
450 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
454 doi = {10.1007/978-3-642-22953-4_11},
455 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
456 address = {Oslo, Norway},
464 @techreport{BCVC10:ir,
465 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
466 title = {Convergence Results of Combining Synchronism and Asynchronism for
467 Discrete-State Discrete-Time Dynamic Network},
469 institution = {LIFC - Laboratoire d’{I}nformatique de
470 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
471 type = {Research Report},
472 number = {RR2010-02},
473 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
477 @techreport{Cou10:ir,
478 author = {Couchot, J.-F.},
479 title = {Formal {C}onvergence {P}roof for {D}iscrete
480 {D}ynamical {S}ystems},
481 institution = {LIFC - Laboratoire d’{I}nformatique de
482 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
483 type = {Research Report},
484 number = {RR2010-03},
485 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
493 author = {Bahi, J. M. and Michel, C.},
494 title = {Convergence of discrete asynchronous iterations},
495 journal = {International Journal Computer Mathematics},
502 author = {Bahi, J. M. and Michel, C.},
503 title = {Simulations of asynchronous evolution of discrete systems},
504 journal = {Simulation Practice and Theory},
512 author = {G\'{e}rard M. Baudet},
513 title = {Asynchronous Iterative Methods for Multiprocessors},
519 doi = {http://doi.acm.org/10.1145/322063.322067},
525 title = {Parallel and distributed computation: numerical methods},
526 publisher = prenticeHall,
528 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
529 isbn = {0-13-648700-9}
533 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
534 title = {The software model checker Blast},
542 @INPROCEEDINGS{LeCun85,
544 title = {A learning scheme for threshold networks},
545 booktitle = {Cognitiva'95},
548 address = {Paris, France}
552 author = {Jeffrey L. Elman},
553 title = {Finding Structure in Time},
554 journal = {Cognitive Science},
561 author = {Andreas Frommer and Daniel B. Szyld},
562 title = {On asynchronous iterations},
568 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
574 author = {Goles Ch., E. and Salinas,L.},
575 title = {Comparison between parallel and serial dynamics of Boolean networks},
584 title = {The SPIN Model Checker: Primer and Reference Manual},
585 publisher = {Addison-Wesley, Pearson Education},
587 author = {Gerard J. Holzmann}
591 author = {Shih M.-H. and Ho, J.-L.},
592 title = {Solution of the Boolean Markus-Yamabe Problem},
593 journal = advapplMath,
601 author = {Adrien Richard},
602 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
604 journal = advapplMath,
613 author = {Adrien Richard and Jean-Paul Comet},
614 title = {Necessary conditions for multistationarity in discrete dynamical
616 journal = discreteapplMath,
619 pages = {2403--2413},
626 title = {Les syst\`emes dynamiques discrets},
627 publisher = springer,
629 author = {F. Robert},
631 series = {Math\'ematiques et Applications}
635 author = {Shih, M.-H. and Dong J.-L.},
636 title = {A combinatorial analogue of the Jacobian problem in automata networks},
637 journal = advapplMath,
646 author = {Thomas, R.},
647 title = {Boolean Formalization of Genetic Control Circuits},
655 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
656 title = {Absence of Cycles in Symmetric Neural Networks},
662 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
665 @PROCEEDINGS{DBLP:conf/cav/2002,
666 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
667 Denmark, July 27-31, 2002, Proceedings},
669 editor = {Ed Brinksma and Kim Guldstrand Larsen},
672 publisher = springer,
676 @PROCEEDINGS{DBLP:conf/kbse/2005,
677 title = {20th IEEE/ACM International Conference on Automated Software Engineering
678 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
680 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
682 bibsource = {DBLP, http://dblp.uni-trier.de},
687 author = {Ben-Ari, Mordechai},
689 title = {Principles of the Spin Model Checker},
690 isbn = {1846287693, 9781846287695}},
691 publisher = springer,
695 @INPROCEEDINGS{Wei97,
696 author = {Weise,Carsten},
697 title = {An incremental formal semantics for {PROMELA}},
698 booktitle = {SPIN97, the Third SPIN Workshop},
703 @PHDTHESIS{Couchot-PhD06,
704 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
705 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
708 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
709 TYPE = {Th\`ese de {D}octorat},
714 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
715 Page, M. and Tewfik, S. and Geiselmann, J.},
716 title = {Qualitative simulation of genetic regulatory networks
717 using piecewise-linear models},
718 journal = {Bull. Math. Biol.},
730 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
731 title = {A Fruitful Application of Formal Methods to Biological
732 Regulatory Networks: Extending {T}homas' Asynchronous
733 Logical Approach with Temporal Logic},
734 journal = {J. Theor. Biol.},
744 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
745 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
746 journal = {Biosystems},
758 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
760 title = {Genetic Network Analyzer: qualitative simulation
761 of genetic regulatory networks.},
762 journal = {Bioinformatics},
770 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
771 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
772 journal = {Genes, Genomes and Genomics},
784 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
785 title = {Analysing formal models of genetic regulatory networks with delays},
786 journal = {Int. J. Bioinformatics Res. Appl.},
792 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
793 publisher = {Inderscience Publishers},
794 address = {Inderscience Publishers, Geneva, SWITZERLAND},
797 author = {Richard, A.},
798 title = {Local negative circuits and fixed points in Boolean networks},
799 institution = {preprint arXiv number 0910.0750},
812 author = {Remy, R. and Ruet, P. and Thieffry, D.},
813 title = {Graphic requirement for multistability and attractive cycles in a
814 Boolean dynamical framework},
815 journal = {Advances in Applied Mathematics},
821 timestamp = {2009.02.05}
824 @inproceedings{DBLP:conf/icann/BahiCMMS06,
825 author = {Jacques M. Bahi and
826 Sylvain Contassot-Vivier and
830 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
831 in Heterogeneous Environments},
832 booktitle = {ICANN (2)},
835 ee = {http://dx.doi.org/10.1007/11840930_81},
836 crossref = {DBLP:conf/icann/2006-2},
837 bibsource = {DBLP, http://dblp.uni-trier.de}
840 @proceedings{DBLP:conf/icann/2006-2,
841 editor = {Stefanos D. Kollias and
842 Andreas Stafylopatis and
845 title = {Artificial Neural Networks - ICANN 2006, 16th International
846 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
848 booktitle = {ICANN (2)},
849 publisher = {Springer},
850 series = {Lecture Notes in Computer Science},
853 isbn = {3-540-38871-0},
854 bibsource = {DBLP, http://dblp.uni-trier.de}
861 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
863 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
864 publisher = {Eyrolles},
882 title = {An Introduction to Chaotic Dynamical Systems},
883 publisher = {Redwood City: Addison-Wesley},
885 author = {R. L. Devaney},
888 timestamp = {27/01/2008}
894 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
897 impact-factor ={1.255},
898 isi-acro = {MECHATRONICS},
899 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
900 title = {Active {MEMS}-based flow control using artificial neural network},
901 journal = {Mechatronics},
905 doi = {10.1016/j.mechatronics.2013.02.010},
906 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
907 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
908 publisher = {Elsevier},
911 note = {Available online. Paper version to appear},
916 @inproceedings{cds12:ip,
918 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
921 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
922 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
923 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
925 editor = {Bourgeois, Julien and de Labachelerie, Michel},
926 address = {Besan\c{c}on, France},
927 publisher = {IEEE CPS},
936 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
939 impact-factor ={2.081},
941 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
942 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
943 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
946 pages = {013122-1 -- 013122-9},
947 doi = {10.1063/1.3685524},
948 url = {http://dx.doi.org/10.1063/1.3685524},
949 publisher = {American Institute of Physics},
957 @inproceedings{bgs11:ip,
959 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
962 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
963 title = {Building a Chaotic Proven Neural Network},
964 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
965 address = {Maldives, Maldives},
971 author = {Bahi, Jacques M. and Guyeux, Christophe},
972 title = {Hash Functions Using Chaotic Iterations},
973 journal = {Journal of Algorithms \& Computational Technology},
978 classement = {ACLNI},
979 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
988 @PHDTHESIS{GuyeuxThese10,
989 author = {Christophe Guyeux},
990 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
991 en s\'{e}curit\'{e} informatique},
992 school = {Universit\'{e} de Franche-Comt\'{e}},
994 owner = {christophe},
995 timestamp = {2010.12.21}
998 @INPROCEEDINGS{gfb10:ip,
999 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1000 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1001 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1002 Multimedia Signal Processing},
1005 address = {Darmstadt, Germany},
1007 classement = {ACTI},
1008 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1015 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1016 title = {Topological entropy},
1017 journal = {Transactions of the American Mathematical Society},
1022 timestamp = {2008.05.29}
1026 author = {Rufus Bowen},
1027 title = {Entropy for group endomorphisms and homogeneous spaces},
1028 journal = {Transactions of the American Mathematical Society},
1033 timestamp = {15/02/2008}
1036 @article{10.1109/CIMSiM.2010.36,
1037 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1038 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1039 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1043 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1044 publisher = {IEEE Computer Society},
1045 address = {Los Alamitos, CA, USA},
1047 @article{10.1109/ICME.2003.1221665,
1048 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1049 title = {Neural network based steganalysis in still images},
1050 journal ={Multimedia and Expo, IEEE International Conference on},
1054 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1055 publisher = {IEEE Computer Society},
1056 address = {Los Alamitos, CA, USA},
1059 @ARTICLE{Sullivan06steganalysisfor,
1060 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1061 title = {Steganalysis for Markov cover data with applications to images},
1062 journal = {IEEE Transactions on Information Forensics and Security},
1071 author = "Gray, Frank",
1072 title = "Pulse code communication",
1073 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1078 @INPROCEEDINGS{guyeux10ter,
1079 author = {Bahi, Jacques M. and Guyeux, Christophe},
1080 title = {A new chaos-based watermarking algorithm},
1081 booktitle = {SECRYPT'10, International Conference on Security
1085 address = {Athens, Greece},
1087 publisher = {SciTePress},
1088 classement = {ACTI},
1089 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1095 @inproceedings{Qiao:2009:SM:1704555.1704664,
1096 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1097 title = {Steganalysis of MP3Stego},
1098 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1099 series = {IJCNN'09},
1101 location = {Atlanta, Georgia, USA},
1102 pages = {2723--2728},
1104 publisher = {IEEE Press}
1107 @inproceedings{CouchotD07IFM,
1109 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1112 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1113 title = {Guiding the Correction of Parameterized Specifications},
1114 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1118 publisher = {Springer},
1119 doi = {10.1007/978-3-540-73210-5_10},
1120 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1121 address = {Oxford, UK},
1127 @inproceedings{couchot07FTP,
1131 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1132 title = {A Graph-based Strategy for the Selection of Hypotheses},
1133 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1134 address = {Liverpool, UK},
1141 @inproceedings{cgs09:ip,
1143 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1145 classement = {ACTI},
1146 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1147 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1148 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1149 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1150 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1151 publisher = {ACM Press},
1153 url = {http://arxiv.org/abs/0907.1357},
1154 otherUrl = {http://hal.inria.fr/inria-00402204},
1155 address = {Grenoble, France},
1156 editor = {Hassen Sa\"{i}di and N. Shankar},
1163 @inproceedings{couchot07cade,
1167 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1168 title = {Handling Polymorphism in Automated Deduction},
1169 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1173 publisher = {Springer},
1174 isbn = {978-3-540-73594-6},
1175 doi = {10.1007/978-3-540-73595-3_18},
1176 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1177 address = {Bremen, Germany},
1189 @inproceedings{BCDG07,
1191 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1192 equipe = {vesontio},
1193 classement = {ACTI},
1194 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1195 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1196 booktitle = {B'2007, the 7th Int. B Conference},
1200 publisher = {Springer},
1201 doi = {10.1007/11955757_10},
1202 url = {http://dx.doi.org/10.1007/11955757_10},
1203 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1204 address = {Besancon, France},
1212 @article{byrd1995limited,
1213 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1214 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1215 journal = {SIAM J. Sci. Comput.},
1216 issue_date = {Sept. 1995},
1222 pages = {1190--1208},
1224 url = {http://dx.doi.org/10.1137/0916069},
1225 doi = {10.1137/0916069},
1227 publisher = {Society for Industrial and Applied Mathematics},
1228 address = {Philadelphia, PA, USA},
1229 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1232 @article{ANU:1770520,
1233 author = {Powell,M. J. D.},
1234 title = {Direct search algorithms for optimization calculations},
1235 journal = {Acta Numerica},
1242 doi = {10.1017/S0962492900002841},
1243 URL = {http://journals.cambridge.org/article_S0962492900002841},
1249 journal={The Journal of Supercomputing},
1252 doi={10.1007/s11227-010-0500-5},
1253 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1254 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1255 publisher={Springer US},
1256 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1257 author={Wang, Honggang},
1263 author={Yifeng He and Lee, I. and Ling Guan},
1264 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1265 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1270 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1271 doi={10.1109/TCSVT.2009.2017411},
1275 author={Palomar, D.P. and Mung Chiang},
1276 journal={Selected Areas in Communications, IEEE Journal on},
1277 title={A tutorial on decomposition methods for network utility maximization},
1282 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1283 doi={10.1109/JSAC.2006.879350},
1288 journal={EURASIP Journal on Information Security},
1292 doi={10.1186/1687-417X-2014-1},
1293 title={Universal distortion function for steganography in an arbitrary domain},
1294 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1295 publisher={Springer International Publishing},
1296 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1300 @inproceedings{conf/wifs/HolubF12,
1301 added-at = {2013-01-23T00:00:00.000+0100},
1302 author = {Holub, Vojtech and Fridrich, Jessica J.},
1303 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1305 crossref = {conf/wifs/2012},
1306 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1307 interhash = {cbef658a6868216eef585dd759ae0668},
1308 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1309 isbn = {978-1-4673-2285-0},
1313 timestamp = {2013-01-23T00:00:00.000+0100},
1314 title = {Designing steganographic distortion using directional filters.},
1315 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1322 @article{FillerJF11,
1323 author = {Tom{\'a}s Filler and
1325 Jessica J. Fridrich},
1326 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1328 journal = {IEEE Transactions on Information Forensics and Security},
1333 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1334 bibsource = {DBLP, http://dblp.uni-trier.de}
1337 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1338 editor = {Ira S. Moskowitz},
1339 author = {Shelby Pereira and
1340 Sviatoslav Voloshynovskiy and
1342 St{\'e}phane Marchand-Maillet and
1344 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1345 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1346 title = {Second Generation Benchmarking and Application Oriented
1351 publisher = springer,
1352 address = springer_loc,
1358 @inproceedings{DBLP:conf/ih/Westfeld01,
1359 added-at = {2011-06-28T00:00:00.000+0200},
1360 author = {Westfeld, Andreas},
1361 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1362 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1363 editor = {Ira S. Moskowitz},
1365 publisher = springer,
1366 address = springer_loc,
1369 title = {F5-A Steganographic Algorithm.},
1378 @article{Chang20101286,
1379 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1380 journal = "Digital Signal Processing",
1383 pages = "1286 - 1307",
1387 doi = "10.1016/j.dsp.2009.11.005",
1388 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1389 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1390 keywords = "Security",
1391 keywords = "Wet paper coding",
1392 keywords = "Steganography",
1393 keywords = "Indicator",
1394 keywords = "Fuzzy edge detector"
1399 @article{Hu:2007:HPE:1282866.1282944,
1400 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1401 title = {A high performance edge detector based on fuzzy inference rules},
1402 journal = {Inf. Sci.},
1403 issue_date = {November, 2007},
1409 pages = {4768--4784},
1411 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1412 doi = {10.1016/j.ins.2007.04.001},
1414 publisher = {Elsevier Science Inc.},
1415 address = {New York, NY, USA},
1416 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1420 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1421 author = {Sorina Dumitrescu and
1423 editor = {Ahmet M. Eskicioglu and
1424 Jessica J. Fridrich and
1426 title = {LSB steganalysis based on high-order statistics},
1427 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1428 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1431 address = {New York, NY, USA},
1434 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1435 bibsource = {DBLP, http://dblp.uni-trier.de}
1438 @inproceedings{DBLP:conf/ih/Ker05,
1439 author = {Andrew D. Ker},
1440 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1441 editor = {Mauro Barni and
1442 Jordi Herrera-Joancomart\'{\i} and
1443 Stefan Katzenbeisser and
1444 Fernando P{\'e}rez-Gonz{\'a}lez},
1445 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1446 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1449 ee = {http://dx.doi.org/10.1007/11558859_22},
1450 publisher = springer,
1451 address = springer_loc,
1458 @inproceedings{FK12,
1459 editor = {Matthias Kirchner and
1461 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1462 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1463 author = {Jessica J. Fridrich and
1465 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1469 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1471 publisher = springer,
1472 address = springer_loc,
1474 bibsource = {DBLP, http://dblp.uni-trier.de}
1478 @article{DBLP:journals/tsp/DumitrescuWW03,
1479 added-at = {2012-02-06T00:00:00.000+0100},
1480 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1481 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1482 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1483 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1484 intrahash = {556caad9b61980d3458885153a52321c},
1485 journal = {IEEE Transactions on Signal Processing},
1488 pages = {1995-2007},
1489 timestamp = {2012-02-06T00:00:00.000+0100},
1490 title = {Detection of LSB steganography via sample pair analysis.},
1491 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1499 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1500 editor = {Nicolas D. Georganas and
1501 Radu Popescu-Zeletin},
1502 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1503 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1505 author = {Jessica J. Fridrich and
1508 title = {Reliable detection of LSB steganography in color and grayscale
1512 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1514 address = {New York, NY, USA},
1516 bibsource = {DBLP, http://dblp.uni-trier.de}
1523 @inproceedings{DBLP:conf/ih/PevnyFB10,
1524 author = {Tom{\'a}s Pevn{\'y} and
1525 Tom{\'a}s Filler and
1527 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1529 editor = {Rainer B{\"o}hme and
1530 Philip W. L. Fong and
1531 Reihaneh Safavi-Naini},
1532 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1533 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1538 publisher = springer,
1539 address = springer_loc,
1542 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1543 bibsource = {DBLP, http://dblp.uni-trier.de}
1552 author = {Tom{\'a}s Pevn{\'y} and
1553 Tom{\'a}s Filler and
1556 title = {Break Our Steganographic System},
1557 OPThowpublished = {},
1560 note = {Available at \url{http://www.agents.cz/boss/}},
1564 @proceedings{DBLP:conf/ih/2010,
1565 editor = {Rainer B{\"o}hme and
1566 Philip W. L. Fong and
1567 Reihaneh Safavi-Naini},
1568 title = {Information Hiding - 12th International Conference, IH 2010,
1569 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1571 booktitle = {Information Hiding},
1572 publisher = springer,
1573 address = springer_loc,
1577 isbn = {978-3-642-16434-7},
1578 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1579 bibsource = {DBLP, http://dblp.uni-trier.de}
1583 @article{DBLP:journals/eswa/ChenCL10,
1584 added-at = {2010-07-21T15:44:10.000+0200},
1585 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1586 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1587 date = {2010-05-03},
1588 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1589 interhash = {bc34a5f04661fee24ee62c39e76361be},
1590 intrahash = {28889a4ab329da28559f0910469f054b},
1591 journal = {Expert Systems with Applications},
1594 pages = {3292-3301},
1595 timestamp = {2010-07-21T15:44:10.000+0200},
1596 title = {High payload steganography mechanism using hybrid edge detector.},
1597 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1602 @article{DBLP:journals/tifs/FillerJF11,
1603 added-at = {2011-09-29T00:00:00.000+0200},
1604 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1605 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1606 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1607 interhash = {b27d23ed0c9936d568e16c51378abccd},
1608 intrahash = {50e43c05a74eec17524b3df8db442da5},
1609 journal = {IEEE Transactions on Information Forensics and Security},
1613 timestamp = {2011-09-29T00:00:00.000+0200},
1614 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1615 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1623 @inproceedings{DBLP:conf/ih/KimDR06,
1624 added-at = {2007-09-20T00:00:00.000+0200},
1625 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1626 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1627 booktitle = {Information Hiding},
1628 crossref = {DBLP:conf/ih/2006},
1629 date = {2007-09-20},
1630 description = {dblp},
1631 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1632 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1633 interhash = {399aab122b39cfd6f6e951a1b276c786},
1634 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1635 isbn = {978-3-540-74123-7},
1639 publisher = springer,
1640 address = springer_loc,
1642 timestamp = {2007-09-20T00:00:00.000+0200},
1643 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1644 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1650 @proceedings{DBLP:conf/ih/2006,
1651 editor = {Jan Camenisch and
1652 Christian S. Collberg and
1655 title = {Information Hiding, 8th International Workshop, IH 2006,
1656 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1657 booktitle = {Information Hiding},
1658 publisher = springer,
1659 address = springer_loc,
1663 isbn = {978-3-540-74123-7},
1664 bibsource = {DBLP, http://dblp.uni-trier.de}
1669 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1670 author = {Jessica J. Fridrich and
1671 Tom{\'a}s Pevn{\'y} and
1673 title = {Statistically undetectable jpeg steganography: dead ends
1674 challenges, and opportunities},
1676 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1677 editor = {Deepa Kundur and
1678 Balakrishnan Prabhakaran and
1680 Jessica J. Fridrich},
1681 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1682 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1684 address = {New York, NY, USA},
1687 isbn = {978-1-59593-857-2},
1688 bibsource = {DBLP, http://dblp.uni-trier.de}
1694 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1695 editor = {Nasir D. Memon and
1697 Adnan M. Alattar and
1699 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1700 Electronic Imaging Symposium, San Jose, CA, USA, January
1701 18-20, 2010, Proceedings},
1702 author = {Tom{\'a}s Filler and
1704 Jessica J. Fridrich},
1705 title = {Minimizing embedding impact in steganography using trellis-coded
1709 ee = {http://dx.doi.org/10.1117/12.838002},
1710 bibsource = {DBLP, http://dblp.uni-trier.de},
1714 series = {SPIE Proceedings},
1725 @proceedings{DBLP:conf/mediaforensics/2010,
1726 editor = {Nasir D. Memon and
1728 Adnan M. Alattar and
1730 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1731 Electronic Imaging Symposium, San Jose, CA, USA, January
1732 18-20, 2010, Proceedings},
1733 booktitle = {Media Forensics and Security},
1736 series = {SPIE Proceedings},
1739 isbn = {978-0-8194-7934-1},
1740 bibsource = {DBLP, http://dblp.uni-trier.de}
1743 @article{DBLP:journals/corr/abs-1112-5239,
1744 author = {Jacques M. Bahi and
1745 Rapha{\"e}l Couturier and
1746 Christophe Guyeux and
1747 Pierre-Cyrille H{\'e}am},
1748 title = {Efficient and Cryptographically Secure Generation of Chaotic
1749 Pseudorandom Numbers on GPU},
1751 volume = {abs/1112.5239},
1753 ee = {http://arxiv.org/abs/1112.5239},
1754 bibsource = {DBLP, http://dblp.uni-trier.de}
1758 author = {Ponomarenko, Nikolay},
1759 title = {PSNR-HVS-M page},
1760 OPThowpublished = {},
1763 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1769 author = {Bovik, Alan C.},
1770 title = {BIQI page},
1771 OPThowpublished = {},
1774 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1779 @InProceedings{PSECAL07,
1780 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1781 title = {On between-coefficient contrast masking of DCT basis functions},
1782 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1785 editor = {Li,Baoxin},
1791 OPTorganization = {},
1799 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1800 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1801 journal = {IEEE Signal Processing Letters},
1812 @inproceedings{DBLP:conf/crypto/ShubBB82,
1813 author = {Lenore Blum and
1816 title = {Comparison of Two Pseudo-Random Number Generators},
1817 editor = {David Chaum and
1818 Ronald L. Rivest and
1820 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1821 Barbara, California, USA, August 23-25, 1982},
1823 bibsource = {DBLP, http://dblp.uni-trier.de},
1824 publisher = {Plenum Press},
1825 address={New York, NY, USA},
1828 bibsource = {DBLP, http://dblp.uni-trier.de}
1832 @inproceedings{Blum:1985:EPP:19478.19501,
1833 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1834 Barbara, California, USA, August 19-22, 1984, Proceedings},
1835 author = {Manuel Blum and
1837 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1838 Which Hides All Partial Information},
1842 editor = {G. R. Blakley and
1844 publisher = springer,
1845 address = springer_loc,
1852 @article{DBLP:journals/ejisec/FontaineG07,
1853 author = {Caroline Fontaine and
1855 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1856 journal = {EURASIP Journal on Information Security},
1861 ee = {http://dx.doi.org/10.1155/2007/13801},
1862 bibsource = {DBLP, http://dblp.uni-trier.de}
1866 @article{Luo:2010:EAI:1824719.1824720,
1867 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1868 title = {Edge adaptive image steganography based on LSB matching revisited},
1869 journal = {IEEE Transactions on Information Forensics and Security},
1877 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1878 doi = {10.1109/TIFS.2010.2041812},
1880 publisher = {IEEE Press},
1881 address = {Piscataway, NJ, USA},
1882 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1885 @article{Mielikainen06,
1886 author = {Mielikainen, J.},
1887 title = {LSB Matching Revisited},
1888 journal = {IEEE Signal Processing Letters},
1903 @article{Liu:2008:FMP:1284917.1285196,
1904 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1905 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1906 journal = {Pattern Recogn.},
1907 issue_date = {January, 2008},
1915 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1916 doi = {10.1016/j.patcog.2007.06.005},
1918 publisher = {Elsevier Science Inc.},
1919 address = {New York, NY, USA},
1920 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1925 @InProceedings{LHS08,
1926 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1927 title = {Textural features based universal steganalysis},
1930 booktitle = {Proc. SPIE 6819},
1941 OPTorganization = {},
1948 @InProceedings{KF11,
1949 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1950 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1953 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1957 pages = {78800L-78800L-13},
1966 OPTorganization = {},
1972 @article{DBLP:journals/tifs/KodovskyFH12,
1973 author = {Jan Kodovsk{\'y} and
1974 Jessica J. Fridrich and
1976 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1977 journal = {IEEE Transactions on Information Forensics and Security},
1982 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1983 bibsource = {DBLP, http://dblp.uni-trier.de}
1988 @article{Fillatre:2012:ASL:2333143.2333587,
1989 author = {Fillatre, Lionel},
1990 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1991 journal = {IEEE Transactions on Signal Processing},
1999 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2000 doi = {10.1109/TSP.2011.2174231},
2002 publisher = {IEEE Press},
2003 address = {Piscataway, NJ, USA},
2007 @inproceedings{Tyan1993,
2008 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2009 address = ieecs_loc,
2011 author = {Tyan, C. Y. and Wang, P. P.},
2012 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2013 citeulike-article-id = {7936501},
2014 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2016 posted-at = {2010-10-01 17:27:48},
2019 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2025 @article{Canny:1986:CAE:11274.11275,
2026 author = {Canny, J},
2027 title = {A Computational Approach to Edge Detection},
2028 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2029 issue_date = {June 1986},
2037 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2038 doi = {10.1109/TPAMI.1986.4767851},
2040 publisher = {IEEE Computer Society},
2041 address = {Washington, DC, USA},
2042 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2046 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2047 author = {Jessica J. Fridrich and
2048 Jan Kodovsk{\'y} and
2051 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2053 booktitle = {Information Hiding},
2056 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2057 crossref = {DBLP:conf/ih/2011},
2058 bibsource = {DBLP, http://dblp.uni-trier.de}
2060 @proceedings{DBLP:conf/ih/2011,
2061 editor = {Tom{\'a}s Filler and
2062 Tom{\'a}s Pevn{\'y} and
2065 title = {Information Hiding - 13th International Conference, IH 2011,
2066 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2068 booktitle = {Information Hiding},
2069 publisher = springer,
2070 address = springer_loc,
2074 isbn = {978-3-642-24177-2},
2075 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2076 bibsource = {DBLP, http://dblp.uni-trier.de}
2079 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2080 author = {Jessica J. Fridrich},
2081 title = {Modern Trends in Steganography and Steganalysis},
2085 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2086 crossref = {DBLP:conf/iwdw/2011},
2087 bibsource = {DBLP, http://dblp.uni-trier.de}
2089 @proceedings{DBLP:conf/iwdw/2011,
2090 editor = {Yun-Qing Shi and
2091 Hyoung-Joong Kim and
2092 Fernando P{\'e}rez-Gonz{\'a}lez},
2093 title = {Digital Forensics and Watermarking - 10th International
2094 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2095 2011, Revised Selected Papers},
2097 publisher = springer,
2098 address = springer_loc,
2102 isbn = {978-3-642-32204-4},
2103 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2104 bibsource = {DBLP, http://dblp.uni-trier.de}
2110 @article{MCErlang07,
2111 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2112 title = {McErlang: a model checker for a distributed functional programming language},
2113 journal = {SIGPLAN Not.},
2122 @inproceedings{Bogor03,
2124 Matthew B. Dwyer and
2126 title = {Bogor: an extensible and highly-modular software model checking
2128 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2129 of Software Engineering 2003},
2137 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2138 title = {On Devaney's Definition of Chaos},
2139 journal = {Amer. Math. Monthly},
2145 timestamp = {27/01/2008}
2148 @article{Crook2007267,
2149 title = "Pattern recall in networks of chaotic neurons",
2150 journal = "Biosystems",
2153 pages = "267 - 274",
2156 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2157 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2159 keywords = "Spiking neural network"
2163 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2164 title = {A novel Hash algorithm construction based on chaotic neural network},
2165 journal = {Neural Computing and Applications},
2168 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2171 keyword = {Computer Science},
2172 publisher = {Springer London}
2176 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2177 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2183 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2184 doi={10.1109/TCE.2004.1309431},
2187 @article{Zhang2005759,
2188 title = "An image encryption approach based on chaotic maps",
2189 journal = "Chaos, Solitons \& Fractals",
2192 pages = "759 - 765",
2196 doi = "10.1016/j.chaos.2004.09.035",
2197 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2200 @article{Lian20091296,
2201 title = "A block cipher based on chaotic neural networks",
2202 journal = "Neurocomputing",
2205 pages = "1296 - 1301",
2208 author = "Shiguo Lian",
2209 keywords = "Neural network",
2211 keywords = "Security",
2212 keywords = "Block cipher",
2213 keywords = "Image encryption"
2217 author = {George Cybenko},
2218 title = {Approximation by Superpositions of a Sigmoidal function},
2219 journal = {Mathematics of Control, Signals and Systems},
2226 @article{DBLP:journals/nn/HornikSW89,
2227 author = {Kurt Hornik and
2228 Maxwell B. Stinchcombe and
2230 title = {Multilayer feedforward networks are universal approximators},
2231 journal = {Neural Networks},
2236 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2237 bibsource = {DBLP, http://dblp.uni-trier.de}
2240 @article{dalkiran10,
2241 author = {Ilker Dalkiran and Kenan Danisman},
2242 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2243 title = {Artificial neural network based chaotic generator for cryptology},
2251 @article{springerlink:10.1007/s00521-010-0432-2,
2252 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2253 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2254 title = {A novel Hash algorithm construction based on chaotic neural network},
2255 journal = {Neural Computing and Applications},
2256 publisher = {Springer},
2258 keyword = {Computer Science},
2264 @article{Feder2009NTB,
2265 author = {Feder, Tom\'{a}s and Subi, Carlos},
2266 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2267 journal = {Inf. Process. Lett.},
2268 issue_date = {February, 2009},
2276 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2277 doi = {10.1016/j.ipl.2008.10.015},
2279 publisher = {Elsevier North-Holland, Inc.},
2280 address = {Amsterdam, The Netherlands, The Netherlands},
2281 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2287 author={Zanten, A.~J.~van and Suparta, I.~N.},
2288 title={ Totally balanced and exponentially balanced Gray codes},
2289 journal={Discrete Analysis and Operational Research},
2297 @book{LevinPeresWilmer2006,
2298 added-at = {2010-01-19T17:51:27.000+0100},
2299 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2300 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2301 interhash = {61354795a6accb6407bfdbf04753a683},
2302 intrahash = {097dc4d1d0e412b2444f540b04110797},
2303 keywords = {markovchains probabilitytheory textbook},
2304 publisher = {American Mathematical Society},
2305 timestamp = {2010-01-19T17:51:27.000+0100},
2306 title = {{Markov chains and mixing times}},
2307 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2312 author = {M. Mitzenmacher and Eli Upfal},
2314 title = {Probability and Computing},
2315 publisher = {Cambridge University Press},
2321 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2324 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2325 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2326 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},