1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
8 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
9 Michel Salomon, Jacques M Bahi},
10 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
13 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
21 address = {Belfast, UK},
28 @inproceedings{chgw+14:oip,
30 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
32 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
33 title = {Pseudorandom Number Generators with Balanced Gray Codes},
34 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
36 address = {Vienna, Austria},
44 @INPROCEEDINGS{nusmv02,
45 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
46 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
47 Sebastiani and Armando Tacchella},
48 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
52 crossref = {DBLP:conf/cav/2002}
56 author = {Nishanth Chandrasekaran},
57 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
62 Author = "Gastin, P. and Oddoux, D.",
63 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
64 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
65 Publisher = "Springer",
73 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
74 title = {A uniform deductive approach for parameterized protocol safety},
78 bibsource = {DBLP, http://dblp.uni-trier.de},
79 crossref = {DBLP:conf/kbse/2005},
80 ee = {http://doi.acm.org/10.1145/1101908.1101971}
83 @INPROCEEDINGS{abcvs05,
84 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
85 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
87 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
91 address = {Guelph, Canada},
93 note = {ISSN 1492-8760}
97 author = {Bahi, J. M.},
98 title = {Boolean totally asynchronous iterations},
106 author = {Bahi, J. M. and Contassot-Vivier, S.},
107 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
117 author = {Bahi, J. M. and Contassot-Vivier, S.},
118 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
123 pages = {1353--1363},
127 @techreport{BCVC10:ir,
128 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
129 title = {Convergence Results of Combining Synchronism and Asynchronism for
130 Discrete-State Discrete-Time Dynamic Network},
132 institution = {LIFC - Laboratoire d’{I}nformatique de
133 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
134 type = {Research Report},
135 number = {RR2010-02},
136 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
140 @techreport{Cou10:ir,
141 author = {Couchot, J.-F.},
142 title = {Formal {C}onvergence {P}roof for {D}iscrete
143 {D}ynamical {S}ystems},
145 institution = {LIFC - Laboratoire d’{I}nformatique de
146 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
147 type = {Research Report},
148 number = {RR2010-03},
149 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
157 author = {Bahi, J. M. and Michel, C.},
158 title = {Convergence of discrete asynchronous iterations},
159 journal = {International Journal Computer Mathematics},
166 author = {Bahi, J. M. and Michel, C.},
167 title = {Simulations of asynchronous evolution of discrete systems},
168 journal = {Simulation Practice and Theory},
176 author = {G\'{e}rard M. Baudet},
177 title = {Asynchronous Iterative Methods for Multiprocessors},
183 doi = {http://doi.acm.org/10.1145/322063.322067},
189 title = {Parallel and distributed computation: numerical methods},
190 publisher = prenticeHall,
192 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
193 isbn = {0-13-648700-9}
197 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
198 title = {The software model checker Blast},
206 @INPROCEEDINGS{LeCun85,
208 title = {A learning scheme for threshold networks},
209 booktitle = {Cognitiva'95},
212 address = {Paris, France}
216 author = {Jeffrey L. Elman},
217 title = {Finding Structure in Time},
218 journal = {Cognitive Science},
225 author = {Andreas Frommer and Daniel B. Szyld},
226 title = {On asynchronous iterations},
232 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
238 author = {Goles Ch., E. and Salinas,L.},
239 title = {Comparison between parallel and serial dynamics of Boolean networks},
248 title = {The SPIN Model Checker: Primer and Reference Manual},
249 publisher = {Addison-Wesley, Pearson Education},
251 author = {Gerard J. Holzmann}
255 author = {Shih M.-H. and Ho, J.-L.},
256 title = {Solution of the Boolean Markus-Yamabe Problem},
257 journal = advapplMath,
265 author = {Adrien Richard},
266 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
268 journal = advapplMath,
277 author = {Adrien Richard and Jean-Paul Comet},
278 title = {Necessary conditions for multistationarity in discrete dynamical
280 journal = discreteapplMath,
283 pages = {2403--2413},
290 title = {Les syst\`emes dynamiques discrets},
291 publisher = springer,
293 author = {F. Robert},
295 series = {Math\'ematiques et Applications}
299 author = {Shih, M.-H. and Dong J.-L.},
300 title = {A combinatorial analogue of the Jacobian problem in automata networks},
301 journal = advapplMath,
310 author = {Thomas, R.},
311 title = {Boolean Formalization of Genetic Control Circuits},
319 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
320 title = {Absence of Cycles in Symmetric Neural Networks},
326 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
329 @PROCEEDINGS{DBLP:conf/cav/2002,
330 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
331 Denmark, July 27-31, 2002, Proceedings},
333 editor = {Ed Brinksma and Kim Guldstrand Larsen},
336 publisher = springer,
340 @PROCEEDINGS{DBLP:conf/kbse/2005,
341 title = {20th IEEE/ACM International Conference on Automated Software Engineering
342 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
344 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
346 bibsource = {DBLP, http://dblp.uni-trier.de},
351 author = {Ben-Ari, Mordechai},
353 title = {Principles of the Spin Model Checker},
354 isbn = {1846287693, 9781846287695}},
355 publisher = springer,
359 @INPROCEEDINGS{Wei97,
360 author = {Weise,Carsten},
361 title = {An incremental formal semantics for {PROMELA}},
362 booktitle = {SPIN97, the Third SPIN Workshop},
367 @PHDTHESIS{Couchot-PhD06,
368 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
369 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
372 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
373 TYPE = {Th\`ese de {D}octorat},
378 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
379 Page, M. and Tewfik, S. and Geiselmann, J.},
380 title = {Qualitative simulation of genetic regulatory networks
381 using piecewise-linear models},
382 journal = {Bull. Math. Biol.},
394 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
395 title = {A Fruitful Application of Formal Methods to Biological
396 Regulatory Networks: Extending {T}homas' Asynchronous
397 Logical Approach with Temporal Logic},
398 journal = {J. Theor. Biol.},
408 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
409 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
410 journal = {Biosystems},
422 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
424 title = {Genetic Network Analyzer: qualitative simulation
425 of genetic regulatory networks.},
426 journal = {Bioinformatics},
434 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
435 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
436 journal = {Genes, Genomes and Genomics},
448 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
449 title = {Analysing formal models of genetic regulatory networks with delays},
450 journal = {Int. J. Bioinformatics Res. Appl.},
456 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
457 publisher = {Inderscience Publishers},
458 address = {Inderscience Publishers, Geneva, SWITZERLAND},
461 author = {Richard, A.},
462 title = {Local negative circuits and fixed points in Boolean networks},
463 institution = {preprint arXiv number 0910.0750},
476 author = {Remy, R. and Ruet, P. and Thieffry, D.},
477 title = {Graphic requirement for multistability and attractive cycles in a
478 Boolean dynamical framework},
479 journal = {Advances in Applied Mathematics},
485 timestamp = {2009.02.05}
488 @inproceedings{DBLP:conf/icann/BahiCMMS06,
489 author = {Jacques M. Bahi and
490 Sylvain Contassot-Vivier and
494 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
495 in Heterogeneous Environments},
496 booktitle = {ICANN (2)},
499 ee = {http://dx.doi.org/10.1007/11840930_81},
500 crossref = {DBLP:conf/icann/2006-2},
501 bibsource = {DBLP, http://dblp.uni-trier.de}
504 @proceedings{DBLP:conf/icann/2006-2,
505 editor = {Stefanos D. Kollias and
506 Andreas Stafylopatis and
509 title = {Artificial Neural Networks - ICANN 2006, 16th International
510 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
512 booktitle = {ICANN (2)},
513 publisher = {Springer},
514 series = {Lecture Notes in Computer Science},
517 isbn = {3-540-38871-0},
518 bibsource = {DBLP, http://dblp.uni-trier.de}
525 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
527 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
528 publisher = {Eyrolles},
546 title = {An Introduction to Chaotic Dynamical Systems},
547 publisher = {Redwood City: Addison-Wesley},
549 author = {R. L. Devaney},
552 timestamp = {27/01/2008}
556 @inproceedings{bgs11:ip,
558 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
561 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
562 title = {Building a Chaotic Proven Neural Network},
563 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
564 address = {Maldives, Maldives},
570 author = {Bahi, Jacques M. and Guyeux, Christophe},
571 title = {Hash Functions Using Chaotic Iterations},
572 journal = {Journal of Algorithms \& Computational Technology},
577 classement = {ACLNI},
578 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
587 @PHDTHESIS{GuyeuxThese10,
588 author = {Christophe Guyeux},
589 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
590 en s\'{e}curit\'{e} informatique},
591 school = {Universit\'{e} de Franche-Comt\'{e}},
593 owner = {christophe},
594 timestamp = {2010.12.21}
597 @INPROCEEDINGS{gfb10:ip,
598 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
599 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
600 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
601 Multimedia Signal Processing},
604 address = {Darmstadt, Germany},
607 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
614 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
615 title = {Topological entropy},
616 journal = {Transactions of the American Mathematical Society},
621 timestamp = {2008.05.29}
625 author = {Rufus Bowen},
626 title = {Entropy for group endomorphisms and homogeneous spaces},
627 journal = {Transactions of the American Mathematical Society},
632 timestamp = {15/02/2008}
635 @article{10.1109/CIMSiM.2010.36,
636 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
637 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
638 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
642 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
643 publisher = {IEEE Computer Society},
644 address = {Los Alamitos, CA, USA},
646 @article{10.1109/ICME.2003.1221665,
647 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
648 title = {Neural network based steganalysis in still images},
649 journal ={Multimedia and Expo, IEEE International Conference on},
653 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
654 publisher = {IEEE Computer Society},
655 address = {Los Alamitos, CA, USA},
658 @ARTICLE{Sullivan06steganalysisfor,
659 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
660 title = {Steganalysis for Markov cover data with applications to images},
661 journal = {IEEE Transactions on Information Forensics and Security},
670 author = "Gray, Frank",
671 title = "Pulse code communication",
672 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
677 @INPROCEEDINGS{guyeux10ter,
678 author = {Bahi, Jacques M. and Guyeux, Christophe},
679 title = {A new chaos-based watermarking algorithm},
680 booktitle = {SECRYPT'10, International Conference on Security
684 address = {Athens, Greece},
686 publisher = {SciTePress},
688 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
694 @inproceedings{Qiao:2009:SM:1704555.1704664,
695 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
696 title = {Steganalysis of MP3Stego},
697 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
700 location = {Atlanta, Georgia, USA},
701 pages = {2723--2728},
703 publisher = {IEEE Press}
708 @article{byrd1995limited,
709 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
710 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
711 journal = {SIAM J. Sci. Comput.},
712 issue_date = {Sept. 1995},
718 pages = {1190--1208},
720 url = {http://dx.doi.org/10.1137/0916069},
721 doi = {10.1137/0916069},
723 publisher = {Society for Industrial and Applied Mathematics},
724 address = {Philadelphia, PA, USA},
725 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
728 @article{ANU:1770520,
729 author = {Powell,M. J. D.},
730 title = {Direct search algorithms for optimization calculations},
731 journal = {Acta Numerica},
738 doi = {10.1017/S0962492900002841},
739 URL = {http://journals.cambridge.org/article_S0962492900002841},
745 journal={The Journal of Supercomputing},
748 doi={10.1007/s11227-010-0500-5},
749 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
750 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
751 publisher={Springer US},
752 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
753 author={Wang, Honggang},
759 author={Yifeng He and Lee, I. and Ling Guan},
760 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
761 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
766 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
767 doi={10.1109/TCSVT.2009.2017411},
771 author={Palomar, D.P. and Mung Chiang},
772 journal={Selected Areas in Communications, IEEE Journal on},
773 title={A tutorial on decomposition methods for network utility maximization},
778 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
779 doi={10.1109/JSAC.2006.879350},
784 journal={EURASIP Journal on Information Security},
788 doi={10.1186/1687-417X-2014-1},
789 title={Universal distortion function for steganography in an arbitrary domain},
790 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
791 publisher={Springer International Publishing},
792 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
796 @inproceedings{conf/wifs/HolubF12,
797 added-at = {2013-01-23T00:00:00.000+0100},
798 author = {Holub, Vojtech and Fridrich, Jessica J.},
799 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
801 crossref = {conf/wifs/2012},
802 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
803 interhash = {cbef658a6868216eef585dd759ae0668},
804 intrahash = {a685b4b8b521ac99734fb52c064ca994},
805 isbn = {978-1-4673-2285-0},
809 timestamp = {2013-01-23T00:00:00.000+0100},
810 title = {Designing steganographic distortion using directional filters.},
811 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
819 author = {Tom{\'a}s Filler and
821 Jessica J. Fridrich},
822 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
824 journal = {IEEE Transactions on Information Forensics and Security},
829 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
830 bibsource = {DBLP, http://dblp.uni-trier.de}
833 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
834 editor = {Ira S. Moskowitz},
835 author = {Shelby Pereira and
836 Sviatoslav Voloshynovskiy and
838 St{\'e}phane Marchand-Maillet and
840 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
841 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
842 title = {Second Generation Benchmarking and Application Oriented
847 publisher = springer,
848 address = springer_loc,
854 @inproceedings{DBLP:conf/ih/Westfeld01,
855 added-at = {2011-06-28T00:00:00.000+0200},
856 author = {Westfeld, Andreas},
857 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
858 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
859 editor = {Ira S. Moskowitz},
861 publisher = springer,
862 address = springer_loc,
865 title = {F5-A Steganographic Algorithm.},
874 @article{Chang20101286,
875 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
876 journal = "Digital Signal Processing",
879 pages = "1286 - 1307",
883 doi = "10.1016/j.dsp.2009.11.005",
884 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
885 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
886 keywords = "Security",
887 keywords = "Wet paper coding",
888 keywords = "Steganography",
889 keywords = "Indicator",
890 keywords = "Fuzzy edge detector"
895 @article{Hu:2007:HPE:1282866.1282944,
896 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
897 title = {A high performance edge detector based on fuzzy inference rules},
898 journal = {Inf. Sci.},
899 issue_date = {November, 2007},
905 pages = {4768--4784},
907 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
908 doi = {10.1016/j.ins.2007.04.001},
910 publisher = {Elsevier Science Inc.},
911 address = {New York, NY, USA},
912 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
916 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
917 author = {Sorina Dumitrescu and
919 editor = {Ahmet M. Eskicioglu and
920 Jessica J. Fridrich and
922 title = {LSB steganalysis based on high-order statistics},
923 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
924 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
927 address = {New York, NY, USA},
930 ee = {http://doi.acm.org/10.1145/1073170.1073176},
931 bibsource = {DBLP, http://dblp.uni-trier.de}
934 @inproceedings{DBLP:conf/ih/Ker05,
935 author = {Andrew D. Ker},
936 title = {A General Framework for Structural Steganalysis of LSB Replacement},
937 editor = {Mauro Barni and
938 Jordi Herrera-Joancomart\'{\i} and
939 Stefan Katzenbeisser and
940 Fernando P{\'e}rez-Gonz{\'a}lez},
941 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
942 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
945 ee = {http://dx.doi.org/10.1007/11558859_22},
946 publisher = springer,
947 address = springer_loc,
955 editor = {Matthias Kirchner and
957 booktitle = {Information Hiding - 14th International Conference, IH 2012,
958 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
959 author = {Jessica J. Fridrich and
961 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
965 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
967 publisher = springer,
968 address = springer_loc,
970 bibsource = {DBLP, http://dblp.uni-trier.de}
974 @article{DBLP:journals/tsp/DumitrescuWW03,
975 added-at = {2012-02-06T00:00:00.000+0100},
976 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
977 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
978 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
979 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
980 intrahash = {556caad9b61980d3458885153a52321c},
981 journal = {IEEE Transactions on Signal Processing},
985 timestamp = {2012-02-06T00:00:00.000+0100},
986 title = {Detection of LSB steganography via sample pair analysis.},
987 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
995 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
996 editor = {Nicolas D. Georganas and
997 Radu Popescu-Zeletin},
998 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
999 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1001 author = {Jessica J. Fridrich and
1004 title = {Reliable detection of LSB steganography in color and grayscale
1008 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1010 address = {New York, NY, USA},
1012 bibsource = {DBLP, http://dblp.uni-trier.de}
1019 @inproceedings{DBLP:conf/ih/PevnyFB10,
1020 author = {Tom{\'a}s Pevn{\'y} and
1021 Tom{\'a}s Filler and
1023 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1025 editor = {Rainer B{\"o}hme and
1026 Philip W. L. Fong and
1027 Reihaneh Safavi-Naini},
1028 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1029 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1034 publisher = springer,
1035 address = springer_loc,
1038 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1039 bibsource = {DBLP, http://dblp.uni-trier.de}
1048 author = {Tom{\'a}s Pevn{\'y} and
1049 Tom{\'a}s Filler and
1052 title = {Break Our Steganographic System},
1053 OPThowpublished = {},
1056 note = {Available at \url{http://www.agents.cz/boss/}},
1060 @proceedings{DBLP:conf/ih/2010,
1061 editor = {Rainer B{\"o}hme and
1062 Philip W. L. Fong and
1063 Reihaneh Safavi-Naini},
1064 title = {Information Hiding - 12th International Conference, IH 2010,
1065 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1067 booktitle = {Information Hiding},
1068 publisher = springer,
1069 address = springer_loc,
1073 isbn = {978-3-642-16434-7},
1074 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1075 bibsource = {DBLP, http://dblp.uni-trier.de}
1079 @article{DBLP:journals/eswa/ChenCL10,
1080 added-at = {2010-07-21T15:44:10.000+0200},
1081 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1082 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1083 date = {2010-05-03},
1084 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1085 interhash = {bc34a5f04661fee24ee62c39e76361be},
1086 intrahash = {28889a4ab329da28559f0910469f054b},
1087 journal = {Expert Systems with Applications},
1090 pages = {3292-3301},
1091 timestamp = {2010-07-21T15:44:10.000+0200},
1092 title = {High payload steganography mechanism using hybrid edge detector.},
1093 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1098 @article{DBLP:journals/tifs/FillerJF11,
1099 added-at = {2011-09-29T00:00:00.000+0200},
1100 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1101 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1102 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1103 interhash = {b27d23ed0c9936d568e16c51378abccd},
1104 intrahash = {50e43c05a74eec17524b3df8db442da5},
1105 journal = {IEEE Transactions on Information Forensics and Security},
1109 timestamp = {2011-09-29T00:00:00.000+0200},
1110 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1111 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1119 @inproceedings{DBLP:conf/ih/KimDR06,
1120 added-at = {2007-09-20T00:00:00.000+0200},
1121 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1122 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1123 booktitle = {Information Hiding},
1124 crossref = {DBLP:conf/ih/2006},
1125 date = {2007-09-20},
1126 description = {dblp},
1127 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1128 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1129 interhash = {399aab122b39cfd6f6e951a1b276c786},
1130 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1131 isbn = {978-3-540-74123-7},
1135 publisher = springer,
1136 address = springer_loc,
1138 timestamp = {2007-09-20T00:00:00.000+0200},
1139 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1140 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1146 @proceedings{DBLP:conf/ih/2006,
1147 editor = {Jan Camenisch and
1148 Christian S. Collberg and
1151 title = {Information Hiding, 8th International Workshop, IH 2006,
1152 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1153 booktitle = {Information Hiding},
1154 publisher = springer,
1155 address = springer_loc,
1159 isbn = {978-3-540-74123-7},
1160 bibsource = {DBLP, http://dblp.uni-trier.de}
1165 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1166 author = {Jessica J. Fridrich and
1167 Tom{\'a}s Pevn{\'y} and
1169 title = {Statistically undetectable jpeg steganography: dead ends
1170 challenges, and opportunities},
1172 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1173 editor = {Deepa Kundur and
1174 Balakrishnan Prabhakaran and
1176 Jessica J. Fridrich},
1177 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1178 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1180 address = {New York, NY, USA},
1183 isbn = {978-1-59593-857-2},
1184 bibsource = {DBLP, http://dblp.uni-trier.de}
1190 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1191 editor = {Nasir D. Memon and
1193 Adnan M. Alattar and
1195 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1196 Electronic Imaging Symposium, San Jose, CA, USA, January
1197 18-20, 2010, Proceedings},
1198 author = {Tom{\'a}s Filler and
1200 Jessica J. Fridrich},
1201 title = {Minimizing embedding impact in steganography using trellis-coded
1205 ee = {http://dx.doi.org/10.1117/12.838002},
1206 bibsource = {DBLP, http://dblp.uni-trier.de},
1210 series = {SPIE Proceedings},
1221 @proceedings{DBLP:conf/mediaforensics/2010,
1222 editor = {Nasir D. Memon and
1224 Adnan M. Alattar and
1226 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1227 Electronic Imaging Symposium, San Jose, CA, USA, January
1228 18-20, 2010, Proceedings},
1229 booktitle = {Media Forensics and Security},
1232 series = {SPIE Proceedings},
1235 isbn = {978-0-8194-7934-1},
1236 bibsource = {DBLP, http://dblp.uni-trier.de}
1239 @article{DBLP:journals/corr/abs-1112-5239,
1240 author = {Jacques M. Bahi and
1241 Rapha{\"e}l Couturier and
1242 Christophe Guyeux and
1243 Pierre-Cyrille H{\'e}am},
1244 title = {Efficient and Cryptographically Secure Generation of Chaotic
1245 Pseudorandom Numbers on GPU},
1247 volume = {abs/1112.5239},
1249 ee = {http://arxiv.org/abs/1112.5239},
1250 bibsource = {DBLP, http://dblp.uni-trier.de}
1254 author = {Ponomarenko, Nikolay},
1255 title = {PSNR-HVS-M page},
1256 OPThowpublished = {},
1259 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1265 author = {Bovik, Alan C.},
1266 title = {BIQI page},
1267 OPThowpublished = {},
1270 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1275 @InProceedings{PSECAL07,
1276 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1277 title = {On between-coefficient contrast masking of DCT basis functions},
1278 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1281 editor = {Li,Baoxin},
1287 OPTorganization = {},
1295 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1296 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1297 journal = {IEEE Signal Processing Letters},
1308 @inproceedings{DBLP:conf/crypto/ShubBB82,
1309 author = {Lenore Blum and
1312 title = {Comparison of Two Pseudo-Random Number Generators},
1313 editor = {David Chaum and
1314 Ronald L. Rivest and
1316 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1317 Barbara, California, USA, August 23-25, 1982},
1319 bibsource = {DBLP, http://dblp.uni-trier.de},
1320 publisher = {Plenum Press},
1321 address={New York, NY, USA},
1324 bibsource = {DBLP, http://dblp.uni-trier.de}
1328 @inproceedings{Blum:1985:EPP:19478.19501,
1329 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1330 Barbara, California, USA, August 19-22, 1984, Proceedings},
1331 author = {Manuel Blum and
1333 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1334 Which Hides All Partial Information},
1338 editor = {G. R. Blakley and
1340 publisher = springer,
1341 address = springer_loc,
1348 @article{DBLP:journals/ejisec/FontaineG07,
1349 author = {Caroline Fontaine and
1351 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1352 journal = {EURASIP Journal on Information Security},
1357 ee = {http://dx.doi.org/10.1155/2007/13801},
1358 bibsource = {DBLP, http://dblp.uni-trier.de}
1362 @article{Luo:2010:EAI:1824719.1824720,
1363 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1364 title = {Edge adaptive image steganography based on LSB matching revisited},
1365 journal = {IEEE Transactions on Information Forensics and Security},
1373 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1374 doi = {10.1109/TIFS.2010.2041812},
1376 publisher = {IEEE Press},
1377 address = {Piscataway, NJ, USA},
1378 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1381 @article{Mielikainen06,
1382 author = {Mielikainen, J.},
1383 title = {LSB Matching Revisited},
1384 journal = {IEEE Signal Processing Letters},
1399 @article{Liu:2008:FMP:1284917.1285196,
1400 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1401 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1402 journal = {Pattern Recogn.},
1403 issue_date = {January, 2008},
1411 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1412 doi = {10.1016/j.patcog.2007.06.005},
1414 publisher = {Elsevier Science Inc.},
1415 address = {New York, NY, USA},
1416 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1421 @InProceedings{LHS08,
1422 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1423 title = {Textural features based universal steganalysis},
1426 booktitle = {Proc. SPIE 6819},
1437 OPTorganization = {},
1444 @InProceedings{KF11,
1445 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1446 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1449 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1453 pages = {78800L-78800L-13},
1462 OPTorganization = {},
1468 @article{DBLP:journals/tifs/KodovskyFH12,
1469 author = {Jan Kodovsk{\'y} and
1470 Jessica J. Fridrich and
1472 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1473 journal = {IEEE Transactions on Information Forensics and Security},
1478 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1479 bibsource = {DBLP, http://dblp.uni-trier.de}
1484 @article{Fillatre:2012:ASL:2333143.2333587,
1485 author = {Fillatre, Lionel},
1486 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1487 journal = {IEEE Transactions on Signal Processing},
1495 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1496 doi = {10.1109/TSP.2011.2174231},
1498 publisher = {IEEE Press},
1499 address = {Piscataway, NJ, USA},
1503 @inproceedings{Tyan1993,
1504 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1505 address = ieecs_loc,
1507 author = {Tyan, C. Y. and Wang, P. P.},
1508 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1509 citeulike-article-id = {7936501},
1510 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1512 posted-at = {2010-10-01 17:27:48},
1515 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1521 @article{Canny:1986:CAE:11274.11275,
1522 author = {Canny, J},
1523 title = {A Computational Approach to Edge Detection},
1524 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1525 issue_date = {June 1986},
1533 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1534 doi = {10.1109/TPAMI.1986.4767851},
1536 publisher = {IEEE Computer Society},
1537 address = {Washington, DC, USA},
1538 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1542 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1543 author = {Jessica J. Fridrich and
1544 Jan Kodovsk{\'y} and
1547 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1549 booktitle = {Information Hiding},
1552 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1553 crossref = {DBLP:conf/ih/2011},
1554 bibsource = {DBLP, http://dblp.uni-trier.de}
1556 @proceedings{DBLP:conf/ih/2011,
1557 editor = {Tom{\'a}s Filler and
1558 Tom{\'a}s Pevn{\'y} and
1561 title = {Information Hiding - 13th International Conference, IH 2011,
1562 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1564 booktitle = {Information Hiding},
1565 publisher = springer,
1566 address = springer_loc,
1570 isbn = {978-3-642-24177-2},
1571 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1572 bibsource = {DBLP, http://dblp.uni-trier.de}
1575 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1576 author = {Jessica J. Fridrich},
1577 title = {Modern Trends in Steganography and Steganalysis},
1581 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1582 crossref = {DBLP:conf/iwdw/2011},
1583 bibsource = {DBLP, http://dblp.uni-trier.de}
1585 @proceedings{DBLP:conf/iwdw/2011,
1586 editor = {Yun-Qing Shi and
1587 Hyoung-Joong Kim and
1588 Fernando P{\'e}rez-Gonz{\'a}lez},
1589 title = {Digital Forensics and Watermarking - 10th International
1590 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1591 2011, Revised Selected Papers},
1593 publisher = springer,
1594 address = springer_loc,
1598 isbn = {978-3-642-32204-4},
1599 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1600 bibsource = {DBLP, http://dblp.uni-trier.de}
1606 @article{MCErlang07,
1607 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1608 title = {McErlang: a model checker for a distributed functional programming language},
1609 journal = {SIGPLAN Not.},
1618 @inproceedings{Bogor03,
1620 Matthew B. Dwyer and
1622 title = {Bogor: an extensible and highly-modular software model checking
1624 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1625 of Software Engineering 2003},
1633 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1634 title = {On Devaney's Definition of Chaos},
1635 journal = {Amer. Math. Monthly},
1641 timestamp = {27/01/2008}
1644 @article{Crook2007267,
1645 title = "Pattern recall in networks of chaotic neurons",
1646 journal = "Biosystems",
1649 pages = "267 - 274",
1652 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1653 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1655 keywords = "Spiking neural network"
1659 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1660 title = {A novel Hash algorithm construction based on chaotic neural network},
1661 journal = {Neural Computing and Applications},
1664 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1667 keyword = {Computer Science},
1668 publisher = {Springer London}
1672 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1673 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1679 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1680 doi={10.1109/TCE.2004.1309431},
1683 @article{Zhang2005759,
1684 title = "An image encryption approach based on chaotic maps",
1685 journal = "Chaos, Solitons \& Fractals",
1688 pages = "759 - 765",
1692 doi = "10.1016/j.chaos.2004.09.035",
1693 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1696 @article{Lian20091296,
1697 title = "A block cipher based on chaotic neural networks",
1698 journal = "Neurocomputing",
1701 pages = "1296 - 1301",
1704 author = "Shiguo Lian",
1705 keywords = "Neural network",
1707 keywords = "Security",
1708 keywords = "Block cipher",
1709 keywords = "Image encryption"
1713 author = {George Cybenko},
1714 title = {Approximation by Superpositions of a Sigmoidal function},
1715 journal = {Mathematics of Control, Signals and Systems},
1722 @article{DBLP:journals/nn/HornikSW89,
1723 author = {Kurt Hornik and
1724 Maxwell B. Stinchcombe and
1726 title = {Multilayer feedforward networks are universal approximators},
1727 journal = {Neural Networks},
1732 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1733 bibsource = {DBLP, http://dblp.uni-trier.de}
1736 @article{dalkiran10,
1737 author = {Ilker Dalkiran and Kenan Danisman},
1738 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1739 title = {Artificial neural network based chaotic generator for cryptology},
1747 @article{springerlink:10.1007/s00521-010-0432-2,
1748 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1749 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1750 title = {A novel Hash algorithm construction based on chaotic neural network},
1751 journal = {Neural Computing and Applications},
1752 publisher = {Springer},
1754 keyword = {Computer Science},