1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Chen, Brian and Wornell, Gregory W.},
7 title = {Provably robust digital watermarking},
8 journal = {Proc. SPIE},
13 doi = {10.1117/12.371232},
14 URL = { http://dx.doi.org/10.1117/12.371232},
19 author={Darazi, R. and Hu, R. and Macq, B.},
20 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
21 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
24 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
25 doi={10.1109/ICASSP.2010.5495455},
29 @INPROCEEDINGS{WLSYNW13,
30 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
31 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
32 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
35 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
36 doi={10.1109/ICIP.2013.6738931},
43 journal={Journal of VLSI signal processing systems for signal, image and video technology},
46 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
47 publisher={Kluwer Academic Publishers},
48 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
49 author={Chen, Brian and Wornell, Gregory W.},
54 author = {Wang, C. T. and Tsai, W. H. },
55 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
58 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
73 @article{DBLP:journals/sigpro/LeeT10,
74 author = {I{-}Shi Lee and
76 title = {A new approach to covert communication via {PDF} files},
77 journal = {Signal Processing},
82 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
83 doi = {10.1016/j.sigpro.2009.07.022},
84 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
85 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
86 bibsource = {dblp computer science bibliography, http://dblp.org}
91 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
92 title = {A Copyright Protection Scheme Based on PDF},
93 journal = {International Journal of Innovative Computing, Information and Control},
100 note = {ISSN 1349-4198},
105 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
106 title = {Using Steganography to hide messages inside PDF files},
107 howpublished = {SSN Project Report},
113 @InProceedings{PD2008,
114 author = {POR, L. Y. and Delina, B.},
115 title = {Information Hiding: A New Approach in Text Steganography},
116 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
125 OPTorganization = {},
131 @article{DBLP:journals/tifs/PevnyBF10,
132 author = {Tom{\'{a}}s Pevn{\'{y}} and
134 Jessica J. Fridrich},
135 title = {Steganalysis by subtractive pixel adjacency matrix},
136 journal = {{IEEE} Transactions on Information Forensics and Security},
141 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
142 doi = {10.1109/TIFS.2010.2045842},
143 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
144 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
145 bibsource = {dblp computer science bibliography, http://dblp.org}
149 @INPROCEEDINGS{rifq/others03,
150 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
153 x-international-audience = {yes},
154 title = {{D}iscrimination power of measures of resemblance},
155 booktitle = {{IFSA}'03},
157 location = {Istanbul, Turkey}
161 @ARTICLE{Rifqi:2000:DPM:342947.342970,
162 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
165 x-international-audience = {yes},
166 title = {{D}iscrimination power of measures of comparison},
167 journal = {{F}uzzy {S}ets and {S}ystems},
175 @book{Anderberg-Cluster-1973,
176 added-at = {2008-10-29T00:31:48.000+0100},
177 author = {Anderberg, M. R.},
178 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
179 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
180 intrahash = {f586cc49441c591f06539d11d3e06006},
181 keywords = {cluster_analysis wismasys0809},
182 publisher = {Academic Press},
183 timestamp = {2008-10-29T00:31:48.000+0100},
184 title = {Cluster Analysis for Applications},
190 @article{yule1950introduction,
191 Author = {Yule, G.U. and Kendall, MG},
192 Date-Added = {2009-08-14 22:16:50 -0500},
193 Date-Modified = {2009-08-14 22:16:50 -0500},
194 Journal = {Statistics},
195 Title = {An Introduction to the Theory of},
199 @inproceedings{fgb11:ip,
201 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
204 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
205 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
206 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
208 address = {Sevilla, Spain},
209 editor = {Javier Lopez and Pierangela Samarati},
210 publisher = {SciTePress},
218 author = {Cayre, F. and Bas, P.},
219 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
220 journal = {IEEE Transactions on Information Forensics and Security},
225 doi = {10.1109/TIFS.2007.916006},
227 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
228 security, watermarking, Kerckhoffs-based embedding security classes,
229 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
230 steganography security, watermark-only-attack, watermarking, Security,
231 spread-spectrum (SS) watermarking},
233 timestamp = {2009.06.29}
235 @INPROCEEDINGS{Perez06,
236 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
237 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
239 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
251 author = {Cayre, F. and Fontaine, C. and Furon, T.},
252 title = {Watermarking security: theory and practice},
253 journal = {IEEE Transactions on Signal Processing},
256 pages = {3976--3987},
258 keywords = {blind source separation, cryptography, watermarking, Fisher information
259 matrix, blind source separation, cryptanalysis, information theory,
260 spread spectrum techniques, substitutive scheme, watermarking security,
261 Blind source separation, Fisher information matrix, equivocation,
262 security, watermarking}
267 @inproceedings{Shujun1,
268 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
269 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
270 Their Roles in Cryptography and Pseudo-Random Coding},
271 booktitle = {Cryptography and Coding, 8th IMA International Conference,
275 publisher = springer,
276 address = springer_loc,
284 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
287 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
288 title = {Random Walk in a N-cube Without Hamiltonian Cycle
289 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
291 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
299 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
302 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
303 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
304 howpublished = {in submission to the ACM Computing Surveys journal},
311 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
317 Couchot, Jean-Fran{\c}cois and
318 Couturier, Rapha\¨el},
319 title = {Blind digital watermarking in PDF documents using
320 Spread Transform Dither Modulation},
321 howpublished = {in submission to the Multimedia Tools and Applications journal},
330 @inproceedings{couchot04:onp,
332 author = {Couchot, Jean-Fran\c{c}ois},
333 title = {V\'erification d'invariant par superposition},
334 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
335 address = {Calais, France},
336 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
337 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
338 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
339 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
348 @inproceedings{aangc+15:ip,
350 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
353 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
354 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
355 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
357 doi = {10.1007/978-3-319-16483-0_38},
358 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
361 address = {Granada, Spain},
373 @inproceedings{agcs+15:ip,
375 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
378 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
379 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
380 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
381 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
383 series = {LNCS/LNBI},
385 publisher = {Springer},
386 address = {Mexico City, Mexico},
390 note = {To appear in the LNCS/LNBI series},
396 @inproceedings{bcg11:ip,
398 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
401 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
402 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
403 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
405 address = {Luxembourg, Luxembourg},
408 note = {Best paper award},
414 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
416 classement = {ACLNI},
419 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
420 title = {Quality analysis of a chaotic proven keyed hash function},
421 journal = {International Journal On Advances in Internet Technology},
433 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
438 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
439 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
440 journal = {Annals of Telecommunications},
441 doi = {10.1007/s12243-015-0466-7},
442 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
443 publisher = {Springer},
445 note = {Available online. Paper version to appear},
449 @inproceedings{fccg15:ip,
451 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
454 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
455 title = {Steganalyzer performances in operational contexts},
456 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
458 address = {Adelaide, Australia},
466 @inproceedings{bcfg12a:ip,
468 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
471 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
472 title = {Application of Steganography for Anonymity through the Internet},
473 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
475 url = {http://arxiv.org/abs/1202.5302v1},
476 address = {Venice, Italy},
483 @inproceedings{bcfg+13:ip,
485 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
488 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
489 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
490 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
492 doi = {10.1109/IIH-MSP.2013.141},
493 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
494 address = {Beijing, China},
500 @inproceedings{bcfg12b:ip,
502 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
505 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
506 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
507 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
509 address = {Venice, Italy},
519 @inproceedings{bcg11b:ip,
521 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
524 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
525 title = {Steganography: a Class of Algorithms having Secure Properties},
526 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
528 address = {Dalian, China},
537 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
540 impact-factor ={1.363},
541 isi-acro = {COMPUT J},
542 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
543 title = {Steganography: a class of secure and robust algorithms},
544 journal = {The Computer Journal},
548 doi = {10.1093/comjnl/bxr116},
549 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
550 publisher = {Oxford University Press},
556 @inproceedings{bcgw11:ip,
558 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
561 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
562 title = {Class of Trustworthy Pseudo Random Number Generators},
563 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
565 address = {Luxembourg, Luxembourg},
573 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
576 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
577 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
578 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
588 @inproceedings{aagp+15:ip,
590 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
592 classement = {ACTIN},
593 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
594 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
595 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
597 address = {Naples, Italy},
605 @inproceedings{acgm+14:ij,
607 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
610 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
611 title = {Finding the Core-Genes of Chloroplasts},
612 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
614 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
616 doi = {10.7763/IJBBB.2014.V4.371},
617 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
618 address = {Copenhagen, Denmark},
628 @inproceedings{akgcs+14:oip,
630 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
633 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
634 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
635 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
636 address = {Belfast, United Kingdom},
640 note = {Short paper},
645 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
648 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
649 title = {Finding the core-genes of Chloroplast Species},
650 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
660 @PhdThesis{guyeuxphd,
661 author = {Guyeux, Christophe},
662 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
663 type = {Th\`ese de {D}octorat},
664 school = {LIFC, Universit\'e de Franche-Comt\'e},
666 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
667 month = {13 décembre},
672 @inproceedings{chgw+14:oip,
674 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
676 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
677 title = {Pseudorandom Number Generators with Balanced Gray Codes},
678 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
680 address = {Vienna, Austria},
689 @INPROCEEDINGS{nusmv02,
690 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
691 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
692 Sebastiani and Armando Tacchella},
693 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
697 crossref = {DBLP:conf/cav/2002}
701 author = {Nishanth Chandrasekaran},
702 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
707 Author = "Gastin, P. and Oddoux, D.",
708 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
709 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
710 Publisher = "Springer",
717 @inproceedings{cg04:np,
719 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
720 title = {Analyse d'atteignabilit\'e d\'eductive},
721 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
723 editor = {Julliand, Jacques},
724 address = {Besan\c{c}on, France},
733 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
734 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
735 journal = {Journal of the Brazilian Computer Society (JBCS)},
739 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
742 note = {ISSN 0104-6500},
747 @inproceedings{cddg+04:ip,
749 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
751 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
752 title = {Proving and Debugging Set-Based Specifications},
753 booktitle = {WMF'03 proceedings},
754 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
757 editor = {A. Cavalcanti and P. Machado},
758 address = {Campina Grande, Brazil},
759 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
766 @inproceedings{cdgr04:onp,
768 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
769 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
771 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
772 address = {Besan\c{c}on, France},
775 editor = {Julliand, Jacques},
776 note = {Session outils},
781 @INPROCEEDINGS{CGK05,
782 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
783 title = {A uniform deductive approach for parameterized protocol safety},
787 bibsource = {DBLP, http://dblp.uni-trier.de},
788 crossref = {DBLP:conf/kbse/2005},
789 ee = {http://doi.acm.org/10.1145/1101908.1101971}
792 @INPROCEEDINGS{abcvs05,
793 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
794 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
796 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
800 address = {Guelph, Canada},
802 note = {ISSN 1492-8760}
806 author = {Bahi, J. M.},
807 title = {Boolean totally asynchronous iterations},
815 author = {Bahi, J. M. and Contassot-Vivier, S.},
816 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
826 author = {Bahi, J. M. and Contassot-Vivier, S.},
827 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
832 pages = {1353--1363},
837 @inproceedings{bcgr11:ip,
839 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
842 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
843 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
844 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
848 doi = {10.1007/978-3-642-22953-4_11},
849 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
850 address = {Oslo, Norway},
858 @techreport{BCVC10:ir,
859 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
860 title = {Convergence Results of Combining Synchronism and Asynchronism for
861 Discrete-State Discrete-Time Dynamic Network},
863 institution = {LIFC - Laboratoire d’{I}nformatique de
864 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
865 type = {Research Report},
866 number = {RR2010-02},
867 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
871 @techreport{Cou10:ir,
872 author = {Couchot, J.-F.},
873 title = {Formal {C}onvergence {P}roof for {D}iscrete
874 {D}ynamical {S}ystems},
875 institution = {LIFC - Laboratoire d’{I}nformatique de
876 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
877 type = {Research Report},
878 number = {RR2010-03},
879 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
887 author = {Bahi, J. M. and Michel, C.},
888 title = {Convergence of discrete asynchronous iterations},
889 journal = {International Journal Computer Mathematics},
896 author = {Bahi, J. M. and Michel, C.},
897 title = {Simulations of asynchronous evolution of discrete systems},
898 journal = {Simulation Practice and Theory},
906 author = {G\'{e}rard M. Baudet},
907 title = {Asynchronous Iterative Methods for Multiprocessors},
913 doi = {http://doi.acm.org/10.1145/322063.322067},
919 title = {Parallel and distributed computation: numerical methods},
920 publisher = prenticeHall,
922 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
923 isbn = {0-13-648700-9}
927 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
928 title = {The software model checker Blast},
936 @INPROCEEDINGS{LeCun85,
938 title = {A learning scheme for threshold networks},
939 booktitle = {Cognitiva'95},
942 address = {Paris, France}
946 author = {Jeffrey L. Elman},
947 title = {Finding Structure in Time},
948 journal = {Cognitive Science},
955 author = {Andreas Frommer and Daniel B. Szyld},
956 title = {On asynchronous iterations},
962 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
968 author = {Goles Ch., E. and Salinas,L.},
969 title = {Comparison between parallel and serial dynamics of Boolean networks},
978 title = {The SPIN Model Checker: Primer and Reference Manual},
979 publisher = {Addison-Wesley, Pearson Education},
981 author = {Gerard J. Holzmann}
985 author = {Shih M.-H. and Ho, J.-L.},
986 title = {Solution of the Boolean Markus-Yamabe Problem},
987 journal = advapplMath,
995 author = {Adrien Richard},
996 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
998 journal = advapplMath,
1003 publisher = elsevier
1007 author = {Adrien Richard and Jean-Paul Comet},
1008 title = {Necessary conditions for multistationarity in discrete dynamical
1010 journal = discreteapplMath,
1013 pages = {2403--2413},
1016 publisher = elsevier
1020 title = {Les syst\`emes dynamiques discrets},
1021 publisher = springer,
1023 author = {F. Robert},
1025 series = {Math\'ematiques et Applications}
1029 author = {Shih, M.-H. and Dong J.-L.},
1030 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1031 journal = advapplMath,
1040 author = {Thomas, R.},
1041 title = {Boolean Formalization of Genetic Control Circuits},
1049 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1050 title = {Absence of Cycles in Symmetric Neural Networks},
1054 pages = {1235-1249},
1056 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1059 @PROCEEDINGS{DBLP:conf/cav/2002,
1060 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1061 Denmark, July 27-31, 2002, Proceedings},
1063 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1066 publisher = springer,
1070 @PROCEEDINGS{DBLP:conf/kbse/2005,
1071 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1072 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1074 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1076 bibsource = {DBLP, http://dblp.uni-trier.de},
1081 author = {Ben-Ari, Mordechai},
1083 title = {Principles of the Spin Model Checker},
1084 isbn = {1846287693, 9781846287695}},
1085 publisher = springer,
1089 @INPROCEEDINGS{Wei97,
1090 author = {Weise,Carsten},
1091 title = {An incremental formal semantics for {PROMELA}},
1092 booktitle = {SPIN97, the Third SPIN Workshop},
1097 @PHDTHESIS{Couchot-PhD06,
1098 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1099 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1102 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1103 TYPE = {Th\`ese de {D}octorat},
1108 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1109 Page, M. and Tewfik, S. and Geiselmann, J.},
1110 title = {Qualitative simulation of genetic regulatory networks
1111 using piecewise-linear models},
1112 journal = {Bull. Math. Biol.},
1124 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1125 title = {A Fruitful Application of Formal Methods to Biological
1126 Regulatory Networks: Extending {T}homas' Asynchronous
1127 Logical Approach with Temporal Logic},
1128 journal = {J. Theor. Biol.},
1138 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1139 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1140 journal = {Biosystems},
1152 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1154 title = {Genetic Network Analyzer: qualitative simulation
1155 of genetic regulatory networks.},
1156 journal = {Bioinformatics},
1164 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1165 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1166 journal = {Genes, Genomes and Genomics},
1178 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1179 title = {Analysing formal models of genetic regulatory networks with delays},
1180 journal = {Int. J. Bioinformatics Res. Appl.},
1186 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1187 publisher = {Inderscience Publishers},
1188 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1191 author = {Richard, A.},
1192 title = {Local negative circuits and fixed points in Boolean networks},
1193 institution = {preprint arXiv number 0910.0750},
1206 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1207 title = {Graphic requirement for multistability and attractive cycles in a
1208 Boolean dynamical framework},
1209 journal = {Advances in Applied Mathematics},
1215 timestamp = {2009.02.05}
1218 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1219 author = {Jacques M. Bahi and
1220 Sylvain Contassot-Vivier and
1224 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1225 in Heterogeneous Environments},
1226 booktitle = {ICANN (2)},
1229 ee = {http://dx.doi.org/10.1007/11840930_81},
1230 crossref = {DBLP:conf/icann/2006-2},
1231 bibsource = {DBLP, http://dblp.uni-trier.de}
1234 @proceedings{DBLP:conf/icann/2006-2,
1235 editor = {Stefanos D. Kollias and
1236 Andreas Stafylopatis and
1239 title = {Artificial Neural Networks - ICANN 2006, 16th International
1240 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1242 booktitle = {ICANN (2)},
1243 publisher = {Springer},
1244 series = {Lecture Notes in Computer Science},
1247 isbn = {3-540-38871-0},
1248 bibsource = {DBLP, http://dblp.uni-trier.de}
1255 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1257 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1258 publisher = {Eyrolles},
1276 title = {An Introduction to Chaotic Dynamical Systems},
1277 publisher = {Redwood City: Addison-Wesley},
1279 author = {R. L. Devaney},
1282 timestamp = {27/01/2008}
1288 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1290 classement = {ACLI},
1291 impact-factor ={1.255},
1292 isi-acro = {MECHATRONICS},
1293 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1294 title = {Active {MEMS}-based flow control using artificial neural network},
1295 journal = {Mechatronics},
1299 doi = {10.1016/j.mechatronics.2013.02.010},
1300 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1301 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1302 publisher = {Elsevier},
1305 note = {Available online. Paper version to appear},
1310 @inproceedings{cds12:ip,
1312 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1314 classement = {ACTI},
1315 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1316 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1317 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1319 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1320 address = {Besan\c{c}on, France},
1321 publisher = {IEEE CPS},
1330 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1332 classement = {ACLI},
1333 impact-factor ={2.081},
1335 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1336 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1337 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1340 pages = {013122-1 -- 013122-9},
1341 doi = {10.1063/1.3685524},
1342 url = {http://dx.doi.org/10.1063/1.3685524},
1343 publisher = {American Institute of Physics},
1351 @inproceedings{bgs11:ip,
1353 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1355 classement = {ACTI},
1356 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1357 title = {Building a Chaotic Proven Neural Network},
1358 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1359 address = {Maldives, Maldives},
1365 author = {Bahi, Jacques M. and Guyeux, Christophe},
1366 title = {Hash Functions Using Chaotic Iterations},
1367 journal = {Journal of Algorithms \& Computational Technology},
1372 classement = {ACLNI},
1373 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1375 impact-factor = {#},
1382 @PHDTHESIS{GuyeuxThese10,
1383 author = {Christophe Guyeux},
1384 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1385 en s\'{e}curit\'{e} informatique},
1386 school = {Universit\'{e} de Franche-Comt\'{e}},
1388 owner = {christophe},
1389 timestamp = {2010.12.21}
1392 @INPROCEEDINGS{gfb10:ip,
1393 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1394 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1395 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1396 Multimedia Signal Processing},
1399 address = {Darmstadt, Germany},
1401 classement = {ACTI},
1402 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1409 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1410 title = {Topological entropy},
1411 journal = {Transactions of the American Mathematical Society},
1416 timestamp = {2008.05.29}
1420 author = {Rufus Bowen},
1421 title = {Entropy for group endomorphisms and homogeneous spaces},
1422 journal = {Transactions of the American Mathematical Society},
1427 timestamp = {15/02/2008}
1430 @article{10.1109/CIMSiM.2010.36,
1431 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1432 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1433 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1437 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1438 publisher = {IEEE Computer Society},
1439 address = {Los Alamitos, CA, USA},
1441 @article{10.1109/ICME.2003.1221665,
1442 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1443 title = {Neural network based steganalysis in still images},
1444 journal ={Multimedia and Expo, IEEE International Conference on},
1448 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1449 publisher = {IEEE Computer Society},
1450 address = {Los Alamitos, CA, USA},
1453 @ARTICLE{Sullivan06steganalysisfor,
1454 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1455 title = {Steganalysis for Markov cover data with applications to images},
1456 journal = {IEEE Transactions on Information Forensics and Security},
1465 author = "Gray, Frank",
1466 title = "Pulse code communication",
1467 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1472 @INPROCEEDINGS{guyeux10ter,
1473 author = {Bahi, Jacques M. and Guyeux, Christophe},
1474 title = {A new chaos-based watermarking algorithm},
1475 booktitle = {SECRYPT'10, International Conference on Security
1479 address = {Athens, Greece},
1481 publisher = {SciTePress},
1482 classement = {ACTI},
1483 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1489 @inproceedings{Qiao:2009:SM:1704555.1704664,
1490 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1491 title = {Steganalysis of MP3Stego},
1492 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1493 series = {IJCNN'09},
1495 location = {Atlanta, Georgia, USA},
1496 pages = {2723--2728},
1498 publisher = {IEEE Press}
1501 @inproceedings{CouchotD07IFM,
1503 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1506 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1507 title = {Guiding the Correction of Parameterized Specifications},
1508 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1512 publisher = {Springer},
1513 doi = {10.1007/978-3-540-73210-5_10},
1514 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1515 address = {Oxford, UK},
1521 @inproceedings{couchot07FTP,
1525 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1526 title = {A Graph-based Strategy for the Selection of Hypotheses},
1527 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1528 address = {Liverpool, UK},
1535 @inproceedings{cgs09:ip,
1537 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1539 classement = {ACTI},
1540 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1541 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1542 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1543 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1544 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1545 publisher = {ACM Press},
1547 url = {http://arxiv.org/abs/0907.1357},
1548 otherUrl = {http://hal.inria.fr/inria-00402204},
1549 address = {Grenoble, France},
1550 editor = {Hassen Sa\"{i}di and N. Shankar},
1557 @inproceedings{couchot07cade,
1561 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1562 title = {Handling Polymorphism in Automated Deduction},
1563 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1567 publisher = {Springer},
1568 isbn = {978-3-540-73594-6},
1569 doi = {10.1007/978-3-540-73595-3_18},
1570 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1571 address = {Bremen, Germany},
1583 @inproceedings{BCDG07,
1585 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1586 equipe = {vesontio},
1587 classement = {ACTI},
1588 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1589 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1590 booktitle = {B'2007, the 7th Int. B Conference},
1594 publisher = {Springer},
1595 doi = {10.1007/11955757_10},
1596 url = {http://dx.doi.org/10.1007/11955757_10},
1597 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1598 address = {Besancon, France},
1606 @article{byrd1995limited,
1607 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1608 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1609 journal = {SIAM J. Sci. Comput.},
1610 issue_date = {Sept. 1995},
1616 pages = {1190--1208},
1618 url = {http://dx.doi.org/10.1137/0916069},
1619 doi = {10.1137/0916069},
1621 publisher = {Society for Industrial and Applied Mathematics},
1622 address = {Philadelphia, PA, USA},
1623 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1626 @article{ANU:1770520,
1627 author = {Powell,M. J. D.},
1628 title = {Direct search algorithms for optimization calculations},
1629 journal = {Acta Numerica},
1636 doi = {10.1017/S0962492900002841},
1637 URL = {http://journals.cambridge.org/article_S0962492900002841},
1643 journal={The Journal of Supercomputing},
1646 doi={10.1007/s11227-010-0500-5},
1647 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1648 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1649 publisher={Springer US},
1650 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1651 author={Wang, Honggang},
1657 author={Yifeng He and Lee, I. and Ling Guan},
1658 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1659 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1664 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1665 doi={10.1109/TCSVT.2009.2017411},
1669 author={Palomar, D.P. and Mung Chiang},
1670 journal={Selected Areas in Communications, IEEE Journal on},
1671 title={A tutorial on decomposition methods for network utility maximization},
1676 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1677 doi={10.1109/JSAC.2006.879350},
1682 journal={EURASIP Journal on Information Security},
1686 doi={10.1186/1687-417X-2014-1},
1687 title={Universal distortion function for steganography in an arbitrary domain},
1688 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1689 publisher={Springer International Publishing},
1690 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1698 @inproceedings{conf/wifs/HolubF12,
1699 added-at = {2013-01-23T00:00:00.000+0100},
1700 author = {Holub, Vojtech and Fridrich, Jessica J.},
1701 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1703 crossref = {conf/wifs/2012},
1704 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1705 interhash = {cbef658a6868216eef585dd759ae0668},
1706 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1707 isbn = {978-1-4673-2285-0},
1711 timestamp = {2013-01-23T00:00:00.000+0100},
1712 title = {Designing steganographic distortion using directional filters.},
1713 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1717 @proceedings{conf/wifs/2012,
1718 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1719 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1720 publisher = {{IEEE}},
1722 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1723 isbn = {978-1-4673-2285-0},
1724 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1725 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1726 bibsource = {dblp computer science bibliography, http://dblp.org}
1730 @article{FillerJF11,
1731 author = {Tom{\'a}s Filler and
1733 Jessica J. Fridrich},
1734 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1736 journal = {IEEE Transactions on Information Forensics and Security},
1741 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1742 bibsource = {DBLP, http://dblp.uni-trier.de}
1745 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1746 editor = {Ira S. Moskowitz},
1747 author = {Shelby Pereira and
1748 Sviatoslav Voloshynovskiy and
1750 St{\'e}phane Marchand-Maillet and
1752 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1753 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1754 title = {Second Generation Benchmarking and Application Oriented
1759 publisher = springer,
1760 address = springer_loc,
1766 @inproceedings{DBLP:conf/ih/Westfeld01,
1767 added-at = {2011-06-28T00:00:00.000+0200},
1768 author = {Westfeld, Andreas},
1769 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1770 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1771 editor = {Ira S. Moskowitz},
1773 publisher = springer,
1774 address = springer_loc,
1777 title = {F5-A Steganographic Algorithm.},
1786 @article{Chang20101286,
1787 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1788 journal = "Digital Signal Processing",
1791 pages = "1286 - 1307",
1795 doi = "10.1016/j.dsp.2009.11.005",
1796 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1797 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1798 keywords = "Security",
1799 keywords = "Wet paper coding",
1800 keywords = "Steganography",
1801 keywords = "Indicator",
1802 keywords = "Fuzzy edge detector"
1807 @article{Hu:2007:HPE:1282866.1282944,
1808 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1809 title = {A high performance edge detector based on fuzzy inference rules},
1810 journal = {Inf. Sci.},
1811 issue_date = {November, 2007},
1817 pages = {4768--4784},
1819 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1820 doi = {10.1016/j.ins.2007.04.001},
1822 publisher = {Elsevier Science Inc.},
1823 address = {New York, NY, USA},
1824 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1828 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1829 author = {Sorina Dumitrescu and
1831 editor = {Ahmet M. Eskicioglu and
1832 Jessica J. Fridrich and
1834 title = {LSB steganalysis based on high-order statistics},
1835 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1836 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1839 address = {New York, NY, USA},
1842 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1843 bibsource = {DBLP, http://dblp.uni-trier.de}
1846 @inproceedings{DBLP:conf/ih/Ker05,
1847 author = {Andrew D. Ker},
1848 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1849 editor = {Mauro Barni and
1850 Jordi Herrera-Joancomart\'{\i} and
1851 Stefan Katzenbeisser and
1852 Fernando P{\'e}rez-Gonz{\'a}lez},
1853 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1854 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1857 ee = {http://dx.doi.org/10.1007/11558859_22},
1858 publisher = springer,
1859 address = springer_loc,
1866 @inproceedings{FK12,
1867 editor = {Matthias Kirchner and
1869 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1870 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1871 author = {Jessica J. Fridrich and
1873 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1877 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1879 publisher = springer,
1880 address = springer_loc,
1882 bibsource = {DBLP, http://dblp.uni-trier.de}
1886 @article{DBLP:journals/tsp/DumitrescuWW03,
1887 added-at = {2012-02-06T00:00:00.000+0100},
1888 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1889 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1890 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1891 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1892 intrahash = {556caad9b61980d3458885153a52321c},
1893 journal = {IEEE Transactions on Signal Processing},
1896 pages = {1995-2007},
1897 timestamp = {2012-02-06T00:00:00.000+0100},
1898 title = {Detection of LSB steganography via sample pair analysis.},
1899 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1907 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1908 editor = {Nicolas D. Georganas and
1909 Radu Popescu-Zeletin},
1910 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1911 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1913 author = {Jessica J. Fridrich and
1916 title = {Reliable detection of LSB steganography in color and grayscale
1920 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1922 address = {New York, NY, USA},
1924 bibsource = {DBLP, http://dblp.uni-trier.de}
1931 @inproceedings{DBLP:conf/ih/PevnyFB10,
1932 author = {Tom{\'a}s Pevn{\'y} and
1933 Tom{\'a}s Filler and
1935 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1937 editor = {Rainer B{\"o}hme and
1938 Philip W. L. Fong and
1939 Reihaneh Safavi-Naini},
1940 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1941 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1946 publisher = springer,
1947 address = springer_loc,
1950 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1951 bibsource = {DBLP, http://dblp.uni-trier.de}
1960 author = {Tom{\'a}s Pevn{\'y} and
1961 Tom{\'a}s Filler and
1964 title = {Break Our Steganographic System},
1965 OPThowpublished = {},
1968 note = {Available at \url{http://www.agents.cz/boss/}},
1972 @proceedings{DBLP:conf/ih/2010,
1973 editor = {Rainer B{\"o}hme and
1974 Philip W. L. Fong and
1975 Reihaneh Safavi-Naini},
1976 title = {Information Hiding - 12th International Conference, IH 2010,
1977 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1979 booktitle = {Information Hiding},
1980 publisher = springer,
1981 address = springer_loc,
1985 isbn = {978-3-642-16434-7},
1986 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1987 bibsource = {DBLP, http://dblp.uni-trier.de}
1991 @article{DBLP:journals/eswa/ChenCL10,
1992 added-at = {2010-07-21T15:44:10.000+0200},
1993 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1994 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1995 date = {2010-05-03},
1996 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1997 interhash = {bc34a5f04661fee24ee62c39e76361be},
1998 intrahash = {28889a4ab329da28559f0910469f054b},
1999 journal = {Expert Systems with Applications},
2002 pages = {3292-3301},
2003 timestamp = {2010-07-21T15:44:10.000+0200},
2004 title = {High payload steganography mechanism using hybrid edge detector.},
2005 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2010 @article{DBLP:journals/tifs/FillerJF11,
2011 added-at = {2011-09-29T00:00:00.000+0200},
2012 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2013 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2014 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2015 interhash = {b27d23ed0c9936d568e16c51378abccd},
2016 intrahash = {50e43c05a74eec17524b3df8db442da5},
2017 journal = {IEEE Transactions on Information Forensics and Security},
2021 timestamp = {2011-09-29T00:00:00.000+0200},
2022 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2023 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2031 @inproceedings{DBLP:conf/ih/KimDR06,
2032 added-at = {2007-09-20T00:00:00.000+0200},
2033 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2034 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2035 booktitle = {Information Hiding},
2036 crossref = {DBLP:conf/ih/2006},
2037 date = {2007-09-20},
2038 description = {dblp},
2039 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2040 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2041 interhash = {399aab122b39cfd6f6e951a1b276c786},
2042 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2043 isbn = {978-3-540-74123-7},
2047 publisher = springer,
2048 address = springer_loc,
2050 timestamp = {2007-09-20T00:00:00.000+0200},
2051 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2052 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2058 @proceedings{DBLP:conf/ih/2006,
2059 editor = {Jan Camenisch and
2060 Christian S. Collberg and
2063 title = {Information Hiding, 8th International Workshop, IH 2006,
2064 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2065 booktitle = {Information Hiding},
2066 publisher = springer,
2067 address = springer_loc,
2071 isbn = {978-3-540-74123-7},
2072 bibsource = {DBLP, http://dblp.uni-trier.de}
2077 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2078 author = {Jessica J. Fridrich and
2079 Tom{\'a}s Pevn{\'y} and
2081 title = {Statistically undetectable jpeg steganography: dead ends
2082 challenges, and opportunities},
2084 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2085 editor = {Deepa Kundur and
2086 Balakrishnan Prabhakaran and
2088 Jessica J. Fridrich},
2089 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2090 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2092 address = {New York, NY, USA},
2095 isbn = {978-1-59593-857-2},
2096 bibsource = {DBLP, http://dblp.uni-trier.de}
2102 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2103 editor = {Nasir D. Memon and
2105 Adnan M. Alattar and
2107 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2108 Electronic Imaging Symposium, San Jose, CA, USA, January
2109 18-20, 2010, Proceedings},
2110 author = {Tom{\'a}s Filler and
2112 Jessica J. Fridrich},
2113 title = {Minimizing embedding impact in steganography using trellis-coded
2117 ee = {http://dx.doi.org/10.1117/12.838002},
2118 bibsource = {DBLP, http://dblp.uni-trier.de},
2122 series = {SPIE Proceedings},
2133 @proceedings{DBLP:conf/mediaforensics/2010,
2134 editor = {Nasir D. Memon and
2136 Adnan M. Alattar and
2138 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2139 Electronic Imaging Symposium, San Jose, CA, USA, January
2140 18-20, 2010, Proceedings},
2141 booktitle = {Media Forensics and Security},
2144 series = {SPIE Proceedings},
2147 isbn = {978-0-8194-7934-1},
2148 bibsource = {DBLP, http://dblp.uni-trier.de}
2151 @article{DBLP:journals/corr/abs-1112-5239,
2152 author = {Jacques M. Bahi and
2153 Rapha{\"e}l Couturier and
2154 Christophe Guyeux and
2155 Pierre-Cyrille H{\'e}am},
2156 title = {Efficient and Cryptographically Secure Generation of Chaotic
2157 Pseudorandom Numbers on GPU},
2159 volume = {abs/1112.5239},
2161 ee = {http://arxiv.org/abs/1112.5239},
2162 bibsource = {DBLP, http://dblp.uni-trier.de}
2166 author = {Ponomarenko, Nikolay},
2167 title = {PSNR-HVS-M page},
2168 OPThowpublished = {},
2171 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2177 author = {Bovik, Alan C.},
2178 title = {BIQI page},
2179 OPThowpublished = {},
2182 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2187 @InProceedings{PSECAL07,
2188 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2189 title = {On between-coefficient contrast masking of DCT basis functions},
2190 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2193 editor = {Li,Baoxin},
2199 OPTorganization = {},
2207 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2208 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2209 journal = {IEEE Signal Processing Letters},
2220 @inproceedings{DBLP:conf/crypto/ShubBB82,
2221 author = {Lenore Blum and
2224 title = {Comparison of Two Pseudo-Random Number Generators},
2225 editor = {David Chaum and
2226 Ronald L. Rivest and
2228 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2229 Barbara, California, USA, August 23-25, 1982},
2231 bibsource = {DBLP, http://dblp.uni-trier.de},
2232 publisher = {Plenum Press},
2233 address={New York, NY, USA},
2236 bibsource = {DBLP, http://dblp.uni-trier.de}
2240 @inproceedings{Blum:1985:EPP:19478.19501,
2241 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2242 Barbara, California, USA, August 19-22, 1984, Proceedings},
2243 author = {Manuel Blum and
2245 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2246 Which Hides All Partial Information},
2250 editor = {G. R. Blakley and
2252 publisher = springer,
2253 address = springer_loc,
2260 @article{DBLP:journals/ejisec/FontaineG07,
2261 author = {Caroline Fontaine and
2263 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2264 journal = {EURASIP Journal on Information Security},
2269 ee = {http://dx.doi.org/10.1155/2007/13801},
2270 bibsource = {DBLP, http://dblp.uni-trier.de}
2274 @article{Luo:2010:EAI:1824719.1824720,
2275 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2276 title = {Edge adaptive image steganography based on LSB matching revisited},
2277 journal = {IEEE Transactions on Information Forensics and Security},
2285 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2286 doi = {10.1109/TIFS.2010.2041812},
2288 publisher = {IEEE Press},
2289 address = {Piscataway, NJ, USA},
2290 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2293 @article{Mielikainen06,
2294 author = {Mielikainen, J.},
2295 title = {LSB Matching Revisited},
2296 journal = {IEEE Signal Processing Letters},
2311 @article{Liu:2008:FMP:1284917.1285196,
2312 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2313 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2314 journal = {Pattern Recogn.},
2315 issue_date = {January, 2008},
2323 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2324 doi = {10.1016/j.patcog.2007.06.005},
2326 publisher = {Elsevier Science Inc.},
2327 address = {New York, NY, USA},
2328 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2333 @InProceedings{LHS08,
2334 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2335 title = {Textural features based universal steganalysis},
2338 booktitle = {Proc. SPIE 6819},
2349 OPTorganization = {},
2356 @InProceedings{KF11,
2357 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2358 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2361 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2365 pages = {78800L-78800L-13},
2374 OPTorganization = {},
2380 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2381 author = {Jan Kodovský and
2383 Jessica J. Fridrich},
2384 title = {Modern steganalysis can detect YASS.},
2385 booktitle = {Media Forensics and Security},
2388 ee = {http://dx.doi.org/10.1117/12.838768}
2391 @article{DBLP:journals/tifs/KodovskyFH12,
2392 author = {Jan Kodovsk{\'y} and
2393 Jessica J. Fridrich and
2395 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2396 journal = {IEEE Transactions on Information Forensics and Security},
2401 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2402 bibsource = {DBLP, http://dblp.uni-trier.de}
2407 @article{Fillatre:2012:ASL:2333143.2333587,
2408 author = {Fillatre, Lionel},
2409 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2410 journal = {IEEE Transactions on Signal Processing},
2418 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2419 doi = {10.1109/TSP.2011.2174231},
2421 publisher = {IEEE Press},
2422 address = {Piscataway, NJ, USA},
2426 @inproceedings{Tyan1993,
2427 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2428 address = ieecs_loc,
2430 author = {Tyan, C. Y. and Wang, P. P.},
2431 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2432 citeulike-article-id = {7936501},
2433 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2435 posted-at = {2010-10-01 17:27:48},
2438 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2444 @article{Canny:1986:CAE:11274.11275,
2445 author = {Canny, J},
2446 title = {A Computational Approach to Edge Detection},
2447 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2448 issue_date = {June 1986},
2456 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2457 doi = {10.1109/TPAMI.1986.4767851},
2459 publisher = {IEEE Computer Society},
2460 address = {Washington, DC, USA},
2461 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2465 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2466 author = {Jessica J. Fridrich and
2467 Jan Kodovsk{\'y} and
2470 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2472 booktitle = {Information Hiding},
2475 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2476 crossref = {DBLP:conf/ih/2011},
2477 bibsource = {DBLP, http://dblp.uni-trier.de}
2479 @proceedings{DBLP:conf/ih/2011,
2480 editor = {Tom{\'a}s Filler and
2481 Tom{\'a}s Pevn{\'y} and
2484 title = {Information Hiding - 13th International Conference, IH 2011,
2485 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2487 booktitle = {Information Hiding},
2488 publisher = springer,
2489 address = springer_loc,
2493 isbn = {978-3-642-24177-2},
2494 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2495 bibsource = {DBLP, http://dblp.uni-trier.de}
2498 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2499 author = {Jessica J. Fridrich},
2500 title = {Modern Trends in Steganography and Steganalysis},
2504 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2505 crossref = {DBLP:conf/iwdw/2011},
2506 bibsource = {DBLP, http://dblp.uni-trier.de}
2508 @proceedings{DBLP:conf/iwdw/2011,
2509 editor = {Yun-Qing Shi and
2510 Hyoung-Joong Kim and
2511 Fernando P{\'e}rez-Gonz{\'a}lez},
2512 title = {Digital Forensics and Watermarking - 10th International
2513 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2514 2011, Revised Selected Papers},
2516 publisher = springer,
2517 address = springer_loc,
2521 isbn = {978-3-642-32204-4},
2522 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2523 bibsource = {DBLP, http://dblp.uni-trier.de}
2529 @article{MCErlang07,
2530 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2531 title = {McErlang: a model checker for a distributed functional programming language},
2532 journal = {SIGPLAN Not.},
2541 @inproceedings{Bogor03,
2543 Matthew B. Dwyer and
2545 title = {Bogor: an extensible and highly-modular software model checking
2547 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2548 of Software Engineering 2003},
2556 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2557 title = {On Devaney's Definition of Chaos},
2558 journal = {Amer. Math. Monthly},
2564 timestamp = {27/01/2008}
2567 @article{Crook2007267,
2568 title = "Pattern recall in networks of chaotic neurons",
2569 journal = "Biosystems",
2572 pages = "267 - 274",
2575 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2576 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2578 keywords = "Spiking neural network"
2582 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2583 title = {A novel Hash algorithm construction based on chaotic neural network},
2584 journal = {Neural Computing and Applications},
2587 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2590 keyword = {Computer Science},
2591 publisher = {Springer London}
2595 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2596 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2602 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2603 doi={10.1109/TCE.2004.1309431},
2606 @article{Zhang2005759,
2607 title = "An image encryption approach based on chaotic maps",
2608 journal = "Chaos, Solitons \& Fractals",
2611 pages = "759 - 765",
2615 doi = "10.1016/j.chaos.2004.09.035",
2616 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2619 @article{Lian20091296,
2620 title = "A block cipher based on chaotic neural networks",
2621 journal = "Neurocomputing",
2624 pages = "1296 - 1301",
2627 author = "Shiguo Lian",
2628 keywords = "Neural network",
2630 keywords = "Security",
2631 keywords = "Block cipher",
2632 keywords = "Image encryption"
2636 author = {George Cybenko},
2637 title = {Approximation by Superpositions of a Sigmoidal function},
2638 journal = {Mathematics of Control, Signals and Systems},
2645 @article{DBLP:journals/nn/HornikSW89,
2646 author = {Kurt Hornik and
2647 Maxwell B. Stinchcombe and
2649 title = {Multilayer feedforward networks are universal approximators},
2650 journal = {Neural Networks},
2655 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2656 bibsource = {DBLP, http://dblp.uni-trier.de}
2659 @article{dalkiran10,
2660 author = {Ilker Dalkiran and Kenan Danisman},
2661 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2662 title = {Artificial neural network based chaotic generator for cryptology},
2670 @article{springerlink:10.1007/s00521-010-0432-2,
2671 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2672 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2673 title = {A novel Hash algorithm construction based on chaotic neural network},
2674 journal = {Neural Computing and Applications},
2675 publisher = {Springer},
2677 keyword = {Computer Science},
2683 @article{Feder2009NTB,
2684 author = {Feder, Tom\'{a}s and Subi, Carlos},
2685 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2686 journal = {Inf. Process. Lett.},
2687 issue_date = {February, 2009},
2695 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2696 doi = {10.1016/j.ipl.2008.10.015},
2698 publisher = {Elsevier North-Holland, Inc.},
2699 address = {Amsterdam, The Netherlands, The Netherlands},
2700 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2706 author={Zanten, A.~J.~van and Suparta, I.~N.},
2707 title={ Totally balanced and exponentially balanced Gray codes},
2708 journal={Discrete Analysis and Operational Research},
2716 @book{LevinPeresWilmer2006,
2717 added-at = {2010-01-19T17:51:27.000+0100},
2718 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2719 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2720 interhash = {61354795a6accb6407bfdbf04753a683},
2721 intrahash = {097dc4d1d0e412b2444f540b04110797},
2722 keywords = {markovchains probabilitytheory textbook},
2723 publisher = {American Mathematical Society},
2724 timestamp = {2010-01-19T17:51:27.000+0100},
2725 title = {{Markov chains and mixing times}},
2726 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2731 author = {M. Mitzenmacher and Eli Upfal},
2733 title = {Probability and Computing},
2734 publisher = {Cambridge University Press},
2740 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2743 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2744 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2745 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},