1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
7 Michel Salomon, Jacques M Bahi},
8 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
11 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
19 address = {Belfast, UK},
26 @inproceedings{chgw+14:oip,
28 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
30 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
31 title = {Pseudorandom Number Generators with Balanced Gray Codes},
32 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
34 address = {Vienna, Austria},
43 @INPROCEEDINGS{nusmv02,
44 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
45 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
46 Sebastiani and Armando Tacchella},
47 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
51 crossref = {DBLP:conf/cav/2002}
55 author = {Nishanth Chandrasekaran},
56 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
61 Author = "Gastin, P. and Oddoux, D.",
62 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
63 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
64 Publisher = "Springer",
72 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
73 title = {A uniform deductive approach for parameterized protocol safety},
77 bibsource = {DBLP, http://dblp.uni-trier.de},
78 crossref = {DBLP:conf/kbse/2005},
79 ee = {http://doi.acm.org/10.1145/1101908.1101971}
82 @INPROCEEDINGS{abcvs05,
83 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
84 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
86 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
90 address = {Guelph, Canada},
92 note = {ISSN 1492-8760}
96 author = {Bahi, J. M.},
97 title = {Boolean totally asynchronous iterations},
105 author = {Bahi, J. M. and Contassot-Vivier, S.},
106 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
116 author = {Bahi, J. M. and Contassot-Vivier, S.},
117 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
122 pages = {1353--1363},
126 @techreport{BCVC10:ir,
127 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
128 title = {Convergence Results of Combining Synchronism and Asynchronism for
129 Discrete-State Discrete-Time Dynamic Network},
131 institution = {LIFC - Laboratoire d’{I}nformatique de
132 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
133 type = {Research Report},
134 number = {RR2010-02},
135 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
139 @techreport{Cou10:ir,
140 author = {Couchot, J.-F.},
141 title = {Formal {C}onvergence {P}roof for {D}iscrete
142 {D}ynamical {S}ystems},
143 institution = {LIFC - Laboratoire d’{I}nformatique de
144 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
145 type = {Research Report},
146 number = {RR2010-03},
147 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
155 author = {Bahi, J. M. and Michel, C.},
156 title = {Convergence of discrete asynchronous iterations},
157 journal = {International Journal Computer Mathematics},
164 author = {Bahi, J. M. and Michel, C.},
165 title = {Simulations of asynchronous evolution of discrete systems},
166 journal = {Simulation Practice and Theory},
174 author = {G\'{e}rard M. Baudet},
175 title = {Asynchronous Iterative Methods for Multiprocessors},
181 doi = {http://doi.acm.org/10.1145/322063.322067},
187 title = {Parallel and distributed computation: numerical methods},
188 publisher = prenticeHall,
190 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
191 isbn = {0-13-648700-9}
195 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
196 title = {The software model checker Blast},
204 @INPROCEEDINGS{LeCun85,
206 title = {A learning scheme for threshold networks},
207 booktitle = {Cognitiva'95},
210 address = {Paris, France}
214 author = {Jeffrey L. Elman},
215 title = {Finding Structure in Time},
216 journal = {Cognitive Science},
223 author = {Andreas Frommer and Daniel B. Szyld},
224 title = {On asynchronous iterations},
230 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
236 author = {Goles Ch., E. and Salinas,L.},
237 title = {Comparison between parallel and serial dynamics of Boolean networks},
246 title = {The SPIN Model Checker: Primer and Reference Manual},
247 publisher = {Addison-Wesley, Pearson Education},
249 author = {Gerard J. Holzmann}
253 author = {Shih M.-H. and Ho, J.-L.},
254 title = {Solution of the Boolean Markus-Yamabe Problem},
255 journal = advapplMath,
263 author = {Adrien Richard},
264 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
266 journal = advapplMath,
275 author = {Adrien Richard and Jean-Paul Comet},
276 title = {Necessary conditions for multistationarity in discrete dynamical
278 journal = discreteapplMath,
281 pages = {2403--2413},
288 title = {Les syst\`emes dynamiques discrets},
289 publisher = springer,
291 author = {F. Robert},
293 series = {Math\'ematiques et Applications}
297 author = {Shih, M.-H. and Dong J.-L.},
298 title = {A combinatorial analogue of the Jacobian problem in automata networks},
299 journal = advapplMath,
308 author = {Thomas, R.},
309 title = {Boolean Formalization of Genetic Control Circuits},
317 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
318 title = {Absence of Cycles in Symmetric Neural Networks},
324 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
327 @PROCEEDINGS{DBLP:conf/cav/2002,
328 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
329 Denmark, July 27-31, 2002, Proceedings},
331 editor = {Ed Brinksma and Kim Guldstrand Larsen},
334 publisher = springer,
338 @PROCEEDINGS{DBLP:conf/kbse/2005,
339 title = {20th IEEE/ACM International Conference on Automated Software Engineering
340 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
342 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
344 bibsource = {DBLP, http://dblp.uni-trier.de},
349 author = {Ben-Ari, Mordechai},
351 title = {Principles of the Spin Model Checker},
352 isbn = {1846287693, 9781846287695}},
353 publisher = springer,
357 @INPROCEEDINGS{Wei97,
358 author = {Weise,Carsten},
359 title = {An incremental formal semantics for {PROMELA}},
360 booktitle = {SPIN97, the Third SPIN Workshop},
365 @PHDTHESIS{Couchot-PhD06,
366 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
367 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
370 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
371 TYPE = {Th\`ese de {D}octorat},
376 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
377 Page, M. and Tewfik, S. and Geiselmann, J.},
378 title = {Qualitative simulation of genetic regulatory networks
379 using piecewise-linear models},
380 journal = {Bull. Math. Biol.},
392 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
393 title = {A Fruitful Application of Formal Methods to Biological
394 Regulatory Networks: Extending {T}homas' Asynchronous
395 Logical Approach with Temporal Logic},
396 journal = {J. Theor. Biol.},
406 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
407 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
408 journal = {Biosystems},
420 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
422 title = {Genetic Network Analyzer: qualitative simulation
423 of genetic regulatory networks.},
424 journal = {Bioinformatics},
432 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
433 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
434 journal = {Genes, Genomes and Genomics},
446 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
447 title = {Analysing formal models of genetic regulatory networks with delays},
448 journal = {Int. J. Bioinformatics Res. Appl.},
454 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
455 publisher = {Inderscience Publishers},
456 address = {Inderscience Publishers, Geneva, SWITZERLAND},
459 author = {Richard, A.},
460 title = {Local negative circuits and fixed points in Boolean networks},
461 institution = {preprint arXiv number 0910.0750},
474 author = {Remy, R. and Ruet, P. and Thieffry, D.},
475 title = {Graphic requirement for multistability and attractive cycles in a
476 Boolean dynamical framework},
477 journal = {Advances in Applied Mathematics},
483 timestamp = {2009.02.05}
486 @inproceedings{DBLP:conf/icann/BahiCMMS06,
487 author = {Jacques M. Bahi and
488 Sylvain Contassot-Vivier and
492 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
493 in Heterogeneous Environments},
494 booktitle = {ICANN (2)},
497 ee = {http://dx.doi.org/10.1007/11840930_81},
498 crossref = {DBLP:conf/icann/2006-2},
499 bibsource = {DBLP, http://dblp.uni-trier.de}
502 @proceedings{DBLP:conf/icann/2006-2,
503 editor = {Stefanos D. Kollias and
504 Andreas Stafylopatis and
507 title = {Artificial Neural Networks - ICANN 2006, 16th International
508 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
510 booktitle = {ICANN (2)},
511 publisher = {Springer},
512 series = {Lecture Notes in Computer Science},
515 isbn = {3-540-38871-0},
516 bibsource = {DBLP, http://dblp.uni-trier.de}
523 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
525 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
526 publisher = {Eyrolles},
544 title = {An Introduction to Chaotic Dynamical Systems},
545 publisher = {Redwood City: Addison-Wesley},
547 author = {R. L. Devaney},
550 timestamp = {27/01/2008}
556 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
559 impact-factor ={2.081},
561 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
562 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
563 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
566 pages = {013122-1 -- 013122-9},
567 doi = {10.1063/1.3685524},
568 url = {http://dx.doi.org/10.1063/1.3685524},
569 publisher = {American Institute of Physics},
577 @inproceedings{bgs11:ip,
579 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
582 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
583 title = {Building a Chaotic Proven Neural Network},
584 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
585 address = {Maldives, Maldives},
591 author = {Bahi, Jacques M. and Guyeux, Christophe},
592 title = {Hash Functions Using Chaotic Iterations},
593 journal = {Journal of Algorithms \& Computational Technology},
598 classement = {ACLNI},
599 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
608 @PHDTHESIS{GuyeuxThese10,
609 author = {Christophe Guyeux},
610 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
611 en s\'{e}curit\'{e} informatique},
612 school = {Universit\'{e} de Franche-Comt\'{e}},
614 owner = {christophe},
615 timestamp = {2010.12.21}
618 @INPROCEEDINGS{gfb10:ip,
619 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
620 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
621 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
622 Multimedia Signal Processing},
625 address = {Darmstadt, Germany},
628 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
635 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
636 title = {Topological entropy},
637 journal = {Transactions of the American Mathematical Society},
642 timestamp = {2008.05.29}
646 author = {Rufus Bowen},
647 title = {Entropy for group endomorphisms and homogeneous spaces},
648 journal = {Transactions of the American Mathematical Society},
653 timestamp = {15/02/2008}
656 @article{10.1109/CIMSiM.2010.36,
657 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
658 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
659 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
663 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
664 publisher = {IEEE Computer Society},
665 address = {Los Alamitos, CA, USA},
667 @article{10.1109/ICME.2003.1221665,
668 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
669 title = {Neural network based steganalysis in still images},
670 journal ={Multimedia and Expo, IEEE International Conference on},
674 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
675 publisher = {IEEE Computer Society},
676 address = {Los Alamitos, CA, USA},
679 @ARTICLE{Sullivan06steganalysisfor,
680 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
681 title = {Steganalysis for Markov cover data with applications to images},
682 journal = {IEEE Transactions on Information Forensics and Security},
691 author = "Gray, Frank",
692 title = "Pulse code communication",
693 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
698 @INPROCEEDINGS{guyeux10ter,
699 author = {Bahi, Jacques M. and Guyeux, Christophe},
700 title = {A new chaos-based watermarking algorithm},
701 booktitle = {SECRYPT'10, International Conference on Security
705 address = {Athens, Greece},
707 publisher = {SciTePress},
709 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
715 @inproceedings{Qiao:2009:SM:1704555.1704664,
716 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
717 title = {Steganalysis of MP3Stego},
718 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
721 location = {Atlanta, Georgia, USA},
722 pages = {2723--2728},
724 publisher = {IEEE Press}
727 @inproceedings{CouchotD07IFM,
729 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
732 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
733 title = {Guiding the Correction of Parameterized Specifications},
734 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
738 publisher = {Springer},
739 doi = {10.1007/978-3-540-73210-5_10},
740 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
741 address = {Oxford, UK},
747 @inproceedings{couchot07FTP,
751 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
752 title = {A Graph-based Strategy for the Selection of Hypotheses},
753 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
754 address = {Liverpool, UK},
761 @inproceedings{cgs09:ip,
763 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
766 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
767 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
768 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
769 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
770 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
771 publisher = {ACM Press},
773 url = {http://arxiv.org/abs/0907.1357},
774 otherUrl = {http://hal.inria.fr/inria-00402204},
775 address = {Grenoble, France},
776 editor = {Hassen Sa\"{i}di and N. Shankar},
783 @inproceedings{couchot07cade,
787 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
788 title = {Handling Polymorphism in Automated Deduction},
789 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
793 publisher = {Springer},
794 isbn = {978-3-540-73594-6},
795 doi = {10.1007/978-3-540-73595-3_18},
796 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
797 address = {Bremen, Germany},
809 @inproceedings{BCDG07,
811 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
814 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
815 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
816 booktitle = {B'2007, the 7th Int. B Conference},
820 publisher = {Springer},
821 doi = {10.1007/11955757_10},
822 url = {http://dx.doi.org/10.1007/11955757_10},
823 editor = {Julliand, Jacques and Kouchnarenko, Olga},
824 address = {Besancon, France},
832 @article{byrd1995limited,
833 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
834 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
835 journal = {SIAM J. Sci. Comput.},
836 issue_date = {Sept. 1995},
842 pages = {1190--1208},
844 url = {http://dx.doi.org/10.1137/0916069},
845 doi = {10.1137/0916069},
847 publisher = {Society for Industrial and Applied Mathematics},
848 address = {Philadelphia, PA, USA},
849 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
852 @article{ANU:1770520,
853 author = {Powell,M. J. D.},
854 title = {Direct search algorithms for optimization calculations},
855 journal = {Acta Numerica},
862 doi = {10.1017/S0962492900002841},
863 URL = {http://journals.cambridge.org/article_S0962492900002841},
869 journal={The Journal of Supercomputing},
872 doi={10.1007/s11227-010-0500-5},
873 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
874 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
875 publisher={Springer US},
876 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
877 author={Wang, Honggang},
883 author={Yifeng He and Lee, I. and Ling Guan},
884 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
885 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
890 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
891 doi={10.1109/TCSVT.2009.2017411},
895 author={Palomar, D.P. and Mung Chiang},
896 journal={Selected Areas in Communications, IEEE Journal on},
897 title={A tutorial on decomposition methods for network utility maximization},
902 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
903 doi={10.1109/JSAC.2006.879350},
908 journal={EURASIP Journal on Information Security},
912 doi={10.1186/1687-417X-2014-1},
913 title={Universal distortion function for steganography in an arbitrary domain},
914 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
915 publisher={Springer International Publishing},
916 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
920 @inproceedings{conf/wifs/HolubF12,
921 added-at = {2013-01-23T00:00:00.000+0100},
922 author = {Holub, Vojtech and Fridrich, Jessica J.},
923 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
925 crossref = {conf/wifs/2012},
926 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
927 interhash = {cbef658a6868216eef585dd759ae0668},
928 intrahash = {a685b4b8b521ac99734fb52c064ca994},
929 isbn = {978-1-4673-2285-0},
933 timestamp = {2013-01-23T00:00:00.000+0100},
934 title = {Designing steganographic distortion using directional filters.},
935 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
943 author = {Tom{\'a}s Filler and
945 Jessica J. Fridrich},
946 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
948 journal = {IEEE Transactions on Information Forensics and Security},
953 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
954 bibsource = {DBLP, http://dblp.uni-trier.de}
957 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
958 editor = {Ira S. Moskowitz},
959 author = {Shelby Pereira and
960 Sviatoslav Voloshynovskiy and
962 St{\'e}phane Marchand-Maillet and
964 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
965 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
966 title = {Second Generation Benchmarking and Application Oriented
971 publisher = springer,
972 address = springer_loc,
978 @inproceedings{DBLP:conf/ih/Westfeld01,
979 added-at = {2011-06-28T00:00:00.000+0200},
980 author = {Westfeld, Andreas},
981 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
982 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
983 editor = {Ira S. Moskowitz},
985 publisher = springer,
986 address = springer_loc,
989 title = {F5-A Steganographic Algorithm.},
998 @article{Chang20101286,
999 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1000 journal = "Digital Signal Processing",
1003 pages = "1286 - 1307",
1007 doi = "10.1016/j.dsp.2009.11.005",
1008 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1009 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1010 keywords = "Security",
1011 keywords = "Wet paper coding",
1012 keywords = "Steganography",
1013 keywords = "Indicator",
1014 keywords = "Fuzzy edge detector"
1019 @article{Hu:2007:HPE:1282866.1282944,
1020 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1021 title = {A high performance edge detector based on fuzzy inference rules},
1022 journal = {Inf. Sci.},
1023 issue_date = {November, 2007},
1029 pages = {4768--4784},
1031 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1032 doi = {10.1016/j.ins.2007.04.001},
1034 publisher = {Elsevier Science Inc.},
1035 address = {New York, NY, USA},
1036 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1040 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1041 author = {Sorina Dumitrescu and
1043 editor = {Ahmet M. Eskicioglu and
1044 Jessica J. Fridrich and
1046 title = {LSB steganalysis based on high-order statistics},
1047 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1048 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1051 address = {New York, NY, USA},
1054 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1055 bibsource = {DBLP, http://dblp.uni-trier.de}
1058 @inproceedings{DBLP:conf/ih/Ker05,
1059 author = {Andrew D. Ker},
1060 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1061 editor = {Mauro Barni and
1062 Jordi Herrera-Joancomart\'{\i} and
1063 Stefan Katzenbeisser and
1064 Fernando P{\'e}rez-Gonz{\'a}lez},
1065 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1066 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1069 ee = {http://dx.doi.org/10.1007/11558859_22},
1070 publisher = springer,
1071 address = springer_loc,
1078 @inproceedings{FK12,
1079 editor = {Matthias Kirchner and
1081 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1082 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1083 author = {Jessica J. Fridrich and
1085 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1089 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1091 publisher = springer,
1092 address = springer_loc,
1094 bibsource = {DBLP, http://dblp.uni-trier.de}
1098 @article{DBLP:journals/tsp/DumitrescuWW03,
1099 added-at = {2012-02-06T00:00:00.000+0100},
1100 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1101 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1102 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1103 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1104 intrahash = {556caad9b61980d3458885153a52321c},
1105 journal = {IEEE Transactions on Signal Processing},
1108 pages = {1995-2007},
1109 timestamp = {2012-02-06T00:00:00.000+0100},
1110 title = {Detection of LSB steganography via sample pair analysis.},
1111 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1119 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1120 editor = {Nicolas D. Georganas and
1121 Radu Popescu-Zeletin},
1122 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1123 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1125 author = {Jessica J. Fridrich and
1128 title = {Reliable detection of LSB steganography in color and grayscale
1132 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1134 address = {New York, NY, USA},
1136 bibsource = {DBLP, http://dblp.uni-trier.de}
1143 @inproceedings{DBLP:conf/ih/PevnyFB10,
1144 author = {Tom{\'a}s Pevn{\'y} and
1145 Tom{\'a}s Filler and
1147 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1149 editor = {Rainer B{\"o}hme and
1150 Philip W. L. Fong and
1151 Reihaneh Safavi-Naini},
1152 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1153 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1158 publisher = springer,
1159 address = springer_loc,
1162 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1163 bibsource = {DBLP, http://dblp.uni-trier.de}
1172 author = {Tom{\'a}s Pevn{\'y} and
1173 Tom{\'a}s Filler and
1176 title = {Break Our Steganographic System},
1177 OPThowpublished = {},
1180 note = {Available at \url{http://www.agents.cz/boss/}},
1184 @proceedings{DBLP:conf/ih/2010,
1185 editor = {Rainer B{\"o}hme and
1186 Philip W. L. Fong and
1187 Reihaneh Safavi-Naini},
1188 title = {Information Hiding - 12th International Conference, IH 2010,
1189 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1191 booktitle = {Information Hiding},
1192 publisher = springer,
1193 address = springer_loc,
1197 isbn = {978-3-642-16434-7},
1198 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1199 bibsource = {DBLP, http://dblp.uni-trier.de}
1203 @article{DBLP:journals/eswa/ChenCL10,
1204 added-at = {2010-07-21T15:44:10.000+0200},
1205 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1206 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1207 date = {2010-05-03},
1208 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1209 interhash = {bc34a5f04661fee24ee62c39e76361be},
1210 intrahash = {28889a4ab329da28559f0910469f054b},
1211 journal = {Expert Systems with Applications},
1214 pages = {3292-3301},
1215 timestamp = {2010-07-21T15:44:10.000+0200},
1216 title = {High payload steganography mechanism using hybrid edge detector.},
1217 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1222 @article{DBLP:journals/tifs/FillerJF11,
1223 added-at = {2011-09-29T00:00:00.000+0200},
1224 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1225 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1226 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1227 interhash = {b27d23ed0c9936d568e16c51378abccd},
1228 intrahash = {50e43c05a74eec17524b3df8db442da5},
1229 journal = {IEEE Transactions on Information Forensics and Security},
1233 timestamp = {2011-09-29T00:00:00.000+0200},
1234 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1235 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1243 @inproceedings{DBLP:conf/ih/KimDR06,
1244 added-at = {2007-09-20T00:00:00.000+0200},
1245 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1246 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1247 booktitle = {Information Hiding},
1248 crossref = {DBLP:conf/ih/2006},
1249 date = {2007-09-20},
1250 description = {dblp},
1251 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1252 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1253 interhash = {399aab122b39cfd6f6e951a1b276c786},
1254 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1255 isbn = {978-3-540-74123-7},
1259 publisher = springer,
1260 address = springer_loc,
1262 timestamp = {2007-09-20T00:00:00.000+0200},
1263 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1264 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1270 @proceedings{DBLP:conf/ih/2006,
1271 editor = {Jan Camenisch and
1272 Christian S. Collberg and
1275 title = {Information Hiding, 8th International Workshop, IH 2006,
1276 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1277 booktitle = {Information Hiding},
1278 publisher = springer,
1279 address = springer_loc,
1283 isbn = {978-3-540-74123-7},
1284 bibsource = {DBLP, http://dblp.uni-trier.de}
1289 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1290 author = {Jessica J. Fridrich and
1291 Tom{\'a}s Pevn{\'y} and
1293 title = {Statistically undetectable jpeg steganography: dead ends
1294 challenges, and opportunities},
1296 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1297 editor = {Deepa Kundur and
1298 Balakrishnan Prabhakaran and
1300 Jessica J. Fridrich},
1301 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1302 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1304 address = {New York, NY, USA},
1307 isbn = {978-1-59593-857-2},
1308 bibsource = {DBLP, http://dblp.uni-trier.de}
1314 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1315 editor = {Nasir D. Memon and
1317 Adnan M. Alattar and
1319 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1320 Electronic Imaging Symposium, San Jose, CA, USA, January
1321 18-20, 2010, Proceedings},
1322 author = {Tom{\'a}s Filler and
1324 Jessica J. Fridrich},
1325 title = {Minimizing embedding impact in steganography using trellis-coded
1329 ee = {http://dx.doi.org/10.1117/12.838002},
1330 bibsource = {DBLP, http://dblp.uni-trier.de},
1334 series = {SPIE Proceedings},
1345 @proceedings{DBLP:conf/mediaforensics/2010,
1346 editor = {Nasir D. Memon and
1348 Adnan M. Alattar and
1350 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1351 Electronic Imaging Symposium, San Jose, CA, USA, January
1352 18-20, 2010, Proceedings},
1353 booktitle = {Media Forensics and Security},
1356 series = {SPIE Proceedings},
1359 isbn = {978-0-8194-7934-1},
1360 bibsource = {DBLP, http://dblp.uni-trier.de}
1363 @article{DBLP:journals/corr/abs-1112-5239,
1364 author = {Jacques M. Bahi and
1365 Rapha{\"e}l Couturier and
1366 Christophe Guyeux and
1367 Pierre-Cyrille H{\'e}am},
1368 title = {Efficient and Cryptographically Secure Generation of Chaotic
1369 Pseudorandom Numbers on GPU},
1371 volume = {abs/1112.5239},
1373 ee = {http://arxiv.org/abs/1112.5239},
1374 bibsource = {DBLP, http://dblp.uni-trier.de}
1378 author = {Ponomarenko, Nikolay},
1379 title = {PSNR-HVS-M page},
1380 OPThowpublished = {},
1383 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1389 author = {Bovik, Alan C.},
1390 title = {BIQI page},
1391 OPThowpublished = {},
1394 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1399 @InProceedings{PSECAL07,
1400 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1401 title = {On between-coefficient contrast masking of DCT basis functions},
1402 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1405 editor = {Li,Baoxin},
1411 OPTorganization = {},
1419 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1420 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1421 journal = {IEEE Signal Processing Letters},
1432 @inproceedings{DBLP:conf/crypto/ShubBB82,
1433 author = {Lenore Blum and
1436 title = {Comparison of Two Pseudo-Random Number Generators},
1437 editor = {David Chaum and
1438 Ronald L. Rivest and
1440 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1441 Barbara, California, USA, August 23-25, 1982},
1443 bibsource = {DBLP, http://dblp.uni-trier.de},
1444 publisher = {Plenum Press},
1445 address={New York, NY, USA},
1448 bibsource = {DBLP, http://dblp.uni-trier.de}
1452 @inproceedings{Blum:1985:EPP:19478.19501,
1453 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1454 Barbara, California, USA, August 19-22, 1984, Proceedings},
1455 author = {Manuel Blum and
1457 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1458 Which Hides All Partial Information},
1462 editor = {G. R. Blakley and
1464 publisher = springer,
1465 address = springer_loc,
1472 @article{DBLP:journals/ejisec/FontaineG07,
1473 author = {Caroline Fontaine and
1475 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1476 journal = {EURASIP Journal on Information Security},
1481 ee = {http://dx.doi.org/10.1155/2007/13801},
1482 bibsource = {DBLP, http://dblp.uni-trier.de}
1486 @article{Luo:2010:EAI:1824719.1824720,
1487 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1488 title = {Edge adaptive image steganography based on LSB matching revisited},
1489 journal = {IEEE Transactions on Information Forensics and Security},
1497 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1498 doi = {10.1109/TIFS.2010.2041812},
1500 publisher = {IEEE Press},
1501 address = {Piscataway, NJ, USA},
1502 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1505 @article{Mielikainen06,
1506 author = {Mielikainen, J.},
1507 title = {LSB Matching Revisited},
1508 journal = {IEEE Signal Processing Letters},
1523 @article{Liu:2008:FMP:1284917.1285196,
1524 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1525 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1526 journal = {Pattern Recogn.},
1527 issue_date = {January, 2008},
1535 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1536 doi = {10.1016/j.patcog.2007.06.005},
1538 publisher = {Elsevier Science Inc.},
1539 address = {New York, NY, USA},
1540 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1545 @InProceedings{LHS08,
1546 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1547 title = {Textural features based universal steganalysis},
1550 booktitle = {Proc. SPIE 6819},
1561 OPTorganization = {},
1568 @InProceedings{KF11,
1569 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1570 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1573 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1577 pages = {78800L-78800L-13},
1586 OPTorganization = {},
1592 @article{DBLP:journals/tifs/KodovskyFH12,
1593 author = {Jan Kodovsk{\'y} and
1594 Jessica J. Fridrich and
1596 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1597 journal = {IEEE Transactions on Information Forensics and Security},
1602 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1603 bibsource = {DBLP, http://dblp.uni-trier.de}
1608 @article{Fillatre:2012:ASL:2333143.2333587,
1609 author = {Fillatre, Lionel},
1610 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1611 journal = {IEEE Transactions on Signal Processing},
1619 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1620 doi = {10.1109/TSP.2011.2174231},
1622 publisher = {IEEE Press},
1623 address = {Piscataway, NJ, USA},
1627 @inproceedings{Tyan1993,
1628 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1629 address = ieecs_loc,
1631 author = {Tyan, C. Y. and Wang, P. P.},
1632 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1633 citeulike-article-id = {7936501},
1634 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1636 posted-at = {2010-10-01 17:27:48},
1639 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1645 @article{Canny:1986:CAE:11274.11275,
1646 author = {Canny, J},
1647 title = {A Computational Approach to Edge Detection},
1648 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1649 issue_date = {June 1986},
1657 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1658 doi = {10.1109/TPAMI.1986.4767851},
1660 publisher = {IEEE Computer Society},
1661 address = {Washington, DC, USA},
1662 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1666 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1667 author = {Jessica J. Fridrich and
1668 Jan Kodovsk{\'y} and
1671 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1673 booktitle = {Information Hiding},
1676 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1677 crossref = {DBLP:conf/ih/2011},
1678 bibsource = {DBLP, http://dblp.uni-trier.de}
1680 @proceedings{DBLP:conf/ih/2011,
1681 editor = {Tom{\'a}s Filler and
1682 Tom{\'a}s Pevn{\'y} and
1685 title = {Information Hiding - 13th International Conference, IH 2011,
1686 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1688 booktitle = {Information Hiding},
1689 publisher = springer,
1690 address = springer_loc,
1694 isbn = {978-3-642-24177-2},
1695 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1696 bibsource = {DBLP, http://dblp.uni-trier.de}
1699 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1700 author = {Jessica J. Fridrich},
1701 title = {Modern Trends in Steganography and Steganalysis},
1705 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1706 crossref = {DBLP:conf/iwdw/2011},
1707 bibsource = {DBLP, http://dblp.uni-trier.de}
1709 @proceedings{DBLP:conf/iwdw/2011,
1710 editor = {Yun-Qing Shi and
1711 Hyoung-Joong Kim and
1712 Fernando P{\'e}rez-Gonz{\'a}lez},
1713 title = {Digital Forensics and Watermarking - 10th International
1714 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1715 2011, Revised Selected Papers},
1717 publisher = springer,
1718 address = springer_loc,
1722 isbn = {978-3-642-32204-4},
1723 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1724 bibsource = {DBLP, http://dblp.uni-trier.de}
1730 @article{MCErlang07,
1731 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1732 title = {McErlang: a model checker for a distributed functional programming language},
1733 journal = {SIGPLAN Not.},
1742 @inproceedings{Bogor03,
1744 Matthew B. Dwyer and
1746 title = {Bogor: an extensible and highly-modular software model checking
1748 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1749 of Software Engineering 2003},
1757 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1758 title = {On Devaney's Definition of Chaos},
1759 journal = {Amer. Math. Monthly},
1765 timestamp = {27/01/2008}
1768 @article{Crook2007267,
1769 title = "Pattern recall in networks of chaotic neurons",
1770 journal = "Biosystems",
1773 pages = "267 - 274",
1776 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1777 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1779 keywords = "Spiking neural network"
1783 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1784 title = {A novel Hash algorithm construction based on chaotic neural network},
1785 journal = {Neural Computing and Applications},
1788 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1791 keyword = {Computer Science},
1792 publisher = {Springer London}
1796 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1797 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1803 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1804 doi={10.1109/TCE.2004.1309431},
1807 @article{Zhang2005759,
1808 title = "An image encryption approach based on chaotic maps",
1809 journal = "Chaos, Solitons \& Fractals",
1812 pages = "759 - 765",
1816 doi = "10.1016/j.chaos.2004.09.035",
1817 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1820 @article{Lian20091296,
1821 title = "A block cipher based on chaotic neural networks",
1822 journal = "Neurocomputing",
1825 pages = "1296 - 1301",
1828 author = "Shiguo Lian",
1829 keywords = "Neural network",
1831 keywords = "Security",
1832 keywords = "Block cipher",
1833 keywords = "Image encryption"
1837 author = {George Cybenko},
1838 title = {Approximation by Superpositions of a Sigmoidal function},
1839 journal = {Mathematics of Control, Signals and Systems},
1846 @article{DBLP:journals/nn/HornikSW89,
1847 author = {Kurt Hornik and
1848 Maxwell B. Stinchcombe and
1850 title = {Multilayer feedforward networks are universal approximators},
1851 journal = {Neural Networks},
1856 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1857 bibsource = {DBLP, http://dblp.uni-trier.de}
1860 @article{dalkiran10,
1861 author = {Ilker Dalkiran and Kenan Danisman},
1862 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1863 title = {Artificial neural network based chaotic generator for cryptology},
1871 @article{springerlink:10.1007/s00521-010-0432-2,
1872 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1873 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1874 title = {A novel Hash algorithm construction based on chaotic neural network},
1875 journal = {Neural Computing and Applications},
1876 publisher = {Springer},
1878 keyword = {Computer Science},
1884 @article{Feder2009NTB,
1885 author = {Feder, Tom\'{a}s and Subi, Carlos},
1886 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
1887 journal = {Inf. Process. Lett.},
1888 issue_date = {February, 2009},
1896 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
1897 doi = {10.1016/j.ipl.2008.10.015},
1899 publisher = {Elsevier North-Holland, Inc.},
1900 address = {Amsterdam, The Netherlands, The Netherlands},
1901 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
1907 author={Zanten, A.~J.~van and Suparta, I.~N.},
1908 title={ Totally balanced and exponentially balanced Gray codes},
1909 journal={Discrete Analysis and Operational Research},
1920 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1923 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
1924 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
1925 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},