1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @inproceedings{DBLP:conf/apsipa/TanL14,
5 author = {Shunquan Tan and
7 title = {Stacked convolutional auto-encoders for steganalysis of digital images},
8 booktitle = {Asia-Pacific Signal and Information Processing Association Annual
9 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
13 crossref = {DBLP:conf/apsipa/2014},
14 url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
15 doi = {10.1109/APSIPA.2014.7041565},
16 timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
17 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
18 bibsource = {dblp computer science bibliography, http://dblp.org}
20 @proceedings{DBLP:conf/apsipa/2014,
21 title = {Asia-Pacific Signal and Information Processing Association Annual
22 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
26 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
27 isbn = {978-6-1636-1823-8},
28 timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
29 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
30 bibsource = {dblp computer science bibliography, http://dblp.org}
33 @inproceeding{doi:10.1117/12.2083479,
34 author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
36 Deep learning for steganalysis via convolutional neural networks
38 journal = {Proc. SPIE},
41 pages = {94090J-94090J-10},
43 Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
46 doi = {10.1117/12.2083479},
47 URL = { http://dx.doi.org/10.1117/12.2083479},
53 @inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
54 author = {Dan Claudiu Ciresan and
57 Luca Maria Gambardella and
58 J{\"{u}}rgen Schmidhuber},
59 title = {Flexible, High Performance Convolutional Neural Networks for Image
61 booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
62 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
66 crossref = {DBLP:conf/ijcai/2011},
67 url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
68 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
69 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
70 bibsource = {dblp computer science bibliography, http://dblp.org}
73 @proceedings{DBLP:conf/ijcai/2011,
74 editor = {Toby Walsh},
75 title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
76 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
78 publisher = {{IJCAI/AAAI}},
80 isbn = {978-1-57735-516-8},
81 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
82 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
83 bibsource = {dblp computer science bibliography, http://dblp.org}
87 @article{DBLP:journals/ftsig/DengY14,
90 title = {Deep Learning: Methods and Applications},
91 journal = {Foundations and Trends in Signal Processing},
96 url = {http://dx.doi.org/10.1561/2000000039},
97 doi = {10.1561/2000000039},
98 timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
99 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
100 bibsource = {dblp computer science bibliography, http://dblp.org}
105 journal={Multimedia Tools and Applications},
106 title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
107 publisher={Springer US},
108 author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and
116 author = {Chen, Brian and Wornell, Gregory W.},
117 title = {Provably robust digital watermarking},
118 journal = {Proc. SPIE},
123 doi = {10.1117/12.371232},
124 URL = { http://dx.doi.org/10.1117/12.371232},
129 author={Darazi, R. and Hu, R. and Macq, B.},
130 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
131 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
134 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
135 doi={10.1109/ICASSP.2010.5495455},
139 @INPROCEEDINGS{WLSYNW13,
140 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
141 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
142 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
145 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
146 doi={10.1109/ICIP.2013.6738931},
153 journal={Journal of VLSI signal processing systems for signal, image and video technology},
156 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
157 publisher={Kluwer Academic Publishers},
158 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
159 author={Chen, Brian and Wornell, Gregory W.},
164 author = {Wang, C. T. and Tsai, W. H. },
165 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
168 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
177 OPTorganization = {},
183 @article{DBLP:journals/sigpro/LeeT10,
184 author = {I{-}Shi Lee and
186 title = {A new approach to covert communication via {PDF} files},
187 journal = {Signal Processing},
192 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
193 doi = {10.1016/j.sigpro.2009.07.022},
194 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
195 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
196 bibsource = {dblp computer science bibliography, http://dblp.org}
201 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
202 title = {A Copyright Protection Scheme Based on PDF},
203 journal = {International Journal of Innovative Computing, Information and Control},
210 note = {ISSN 1349-4198},
215 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
216 title = {Using Steganography to hide messages inside PDF files},
217 howpublished = {SSN Project Report},
223 @InProceedings{PD2008,
224 author = {POR, L. Y. and Delina, B.},
225 title = {Information Hiding: A New Approach in Text Steganography},
226 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
235 OPTorganization = {},
241 @article{DBLP:journals/tifs/PevnyBF10,
242 author = {Tom{\'{a}}s Pevn{\'{y}} and
244 Jessica J. Fridrich},
245 title = {Steganalysis by subtractive pixel adjacency matrix},
246 journal = {{IEEE} Transactions on Information Forensics and Security},
251 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
252 doi = {10.1109/TIFS.2010.2045842},
253 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
254 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
255 bibsource = {dblp computer science bibliography, http://dblp.org}
259 @INPROCEEDINGS{rifq/others03,
260 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
263 x-international-audience = {yes},
264 title = {{D}iscrimination power of measures of resemblance},
265 booktitle = {{IFSA}'03},
267 location = {Istanbul, Turkey}
271 @ARTICLE{Rifqi:2000:DPM:342947.342970,
272 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
275 x-international-audience = {yes},
276 title = {{D}iscrimination power of measures of comparison},
277 journal = {{F}uzzy {S}ets and {S}ystems},
285 @book{Anderberg-Cluster-1973,
286 added-at = {2008-10-29T00:31:48.000+0100},
287 author = {Anderberg, M. R.},
288 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
289 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
290 intrahash = {f586cc49441c591f06539d11d3e06006},
291 keywords = {cluster_analysis wismasys0809},
292 publisher = {Academic Press},
293 timestamp = {2008-10-29T00:31:48.000+0100},
294 title = {Cluster Analysis for Applications},
300 @article{yule1950introduction,
301 Author = {Yule, G.U. and Kendall, MG},
302 Date-Added = {2009-08-14 22:16:50 -0500},
303 Date-Modified = {2009-08-14 22:16:50 -0500},
304 Journal = {Statistics},
305 Title = {An Introduction to the Theory of},
309 @inproceedings{fgb11:ip,
311 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
314 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
315 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
316 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
318 address = {Sevilla, Spain},
319 editor = {Javier Lopez and Pierangela Samarati},
320 publisher = {SciTePress},
328 author = {Cayre, F. and Bas, P.},
329 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
330 journal = {IEEE Transactions on Information Forensics and Security},
335 doi = {10.1109/TIFS.2007.916006},
337 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
338 security, watermarking, Kerckhoffs-based embedding security classes,
339 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
340 steganography security, watermark-only-attack, watermarking, Security,
341 spread-spectrum (SS) watermarking},
343 timestamp = {2009.06.29}
345 @INPROCEEDINGS{Perez06,
346 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
347 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
349 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
361 author = {Cayre, F. and Fontaine, C. and Furon, T.},
362 title = {Watermarking security: theory and practice},
363 journal = {IEEE Transactions on Signal Processing},
366 pages = {3976--3987},
368 keywords = {blind source separation, cryptography, watermarking, Fisher information
369 matrix, blind source separation, cryptanalysis, information theory,
370 spread spectrum techniques, substitutive scheme, watermarking security,
371 Blind source separation, Fisher information matrix, equivocation,
372 security, watermarking}
377 @inproceedings{Shujun1,
378 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
379 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
380 Their Roles in Cryptography and Pseudo-Random Coding},
381 booktitle = {Cryptography and Coding, 8th IMA International Conference,
385 publisher = springer,
386 address = springer_loc,
394 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
397 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
398 title = {Random Walk in a N-cube Without Hamiltonian Cycle
399 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
401 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
409 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
412 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
413 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
414 howpublished = {in submission to the ACM Computing Surveys journal},
421 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
427 Couchot, Jean-Fran{\c}cois and
428 Couturier, Rapha\¨el},
429 title = {Blind digital watermarking in PDF documents using
430 Spread Transform Dither Modulation},
431 howpublished = {in submission to the Multimedia Tools and Applications journal},
440 @inproceedings{couchot04:onp,
442 author = {Couchot, Jean-Fran\c{c}ois},
443 title = {V\'erification d'invariant par superposition},
444 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
445 address = {Calais, France},
446 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
447 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
448 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
449 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
458 @inproceedings{aangc+15:ip,
460 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
463 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
464 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
465 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
467 doi = {10.1007/978-3-319-16483-0_38},
468 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
471 address = {Granada, Spain},
483 @inproceedings{agcs+15:ip,
485 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
488 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
489 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
490 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
491 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
493 series = {LNCS/LNBI},
495 publisher = {Springer},
496 address = {Mexico City, Mexico},
500 note = {To appear in the LNCS/LNBI series},
506 @inproceedings{bcg11:ip,
508 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
511 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
512 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
513 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
515 address = {Luxembourg, Luxembourg},
518 note = {Best paper award},
524 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
526 classement = {ACLNI},
529 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
530 title = {Quality analysis of a chaotic proven keyed hash function},
531 journal = {International Journal On Advances in Internet Technology},
543 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
548 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
549 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
550 journal = {Annals of Telecommunications},
551 doi = {10.1007/s12243-015-0466-7},
552 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
553 publisher = {Springer},
555 note = {Available online. Paper version to appear},
559 @inproceedings{fccg15:ip,
561 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
564 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
565 title = {Steganalyzer performances in operational contexts},
566 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
568 address = {Adelaide, Australia},
576 @inproceedings{bcfg12a:ip,
578 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
581 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
582 title = {Application of Steganography for Anonymity through the Internet},
583 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
585 url = {http://arxiv.org/abs/1202.5302v1},
586 address = {Venice, Italy},
595 author = {Guyeux, Christophe},
596 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
597 type = {Th\`ese de {D}octorat},
598 school = {LIFC, Universit\'e de Franche-Comt\'e},
600 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
601 month = {13 décembre},
608 @inproceedings{bcfg+13:ip,
610 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
613 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
614 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
615 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
617 doi = {10.1109/IIH-MSP.2013.141},
618 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
619 address = {Beijing, China},
625 @inproceedings{bcfg12b:ip,
627 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
630 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
631 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
632 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
634 address = {Venice, Italy},
644 @inproceedings{bcg11b:ip,
646 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
649 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
650 title = {Steganography: a Class of Algorithms having Secure Properties},
651 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
653 address = {Dalian, China},
662 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
665 impact-factor ={1.363},
666 isi-acro = {COMPUT J},
667 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
668 title = {Steganography: a class of secure and robust algorithms},
669 journal = {The Computer Journal},
673 doi = {10.1093/comjnl/bxr116},
674 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
675 publisher = {Oxford University Press},
681 @inproceedings{bcgw11:ip,
683 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
686 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
687 title = {Class of Trustworthy Pseudo Random Number Generators},
688 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
690 address = {Luxembourg, Luxembourg},
698 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
701 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
702 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
703 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
713 @inproceedings{aagp+15:ip,
715 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
717 classement = {ACTIN},
718 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
719 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
720 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
722 address = {Naples, Italy},
730 @inproceedings{acgm+14:ij,
732 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
735 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
736 title = {Finding the Core-Genes of Chloroplasts},
737 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
739 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
741 doi = {10.7763/IJBBB.2014.V4.371},
742 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
743 address = {Copenhagen, Denmark},
753 @inproceedings{akgcs+14:oip,
755 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
758 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
759 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
760 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
761 address = {Belfast, United Kingdom},
765 note = {Short paper},
770 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
773 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
774 title = {Finding the core-genes of Chloroplast Species},
775 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
785 @PhdThesis{guyeuxphd,
786 author = {Guyeux, Christophe},
787 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
788 type = {Th\`ese de {D}octorat},
789 school = {LIFC, Universit\'e de Franche-Comt\'e},
791 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
792 month = {13 décembre},
797 @inproceedings{chgw+14:oip,
799 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
801 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
802 title = {Pseudorandom Number Generators with Balanced Gray Codes},
803 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
805 address = {Vienna, Austria},
811 @inproceedings{ccfg16:ip,
812 author = {Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra Ahmed Fadil and Christophe Guyeux},
813 title = {A Second Order Derivatives based Approach for Steganography},
814 booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
825 Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.
829 @INPROCEEDINGS{nusmv02,
830 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
831 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
832 Sebastiani and Armando Tacchella},
833 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
837 crossref = {DBLP:conf/cav/2002}
841 author = {Nishanth Chandrasekaran},
842 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
847 Author = "Gastin, P. and Oddoux, D.",
848 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
849 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
850 Publisher = "Springer",
857 @inproceedings{cg04:np,
859 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
860 title = {Analyse d'atteignabilit\'e d\'eductive},
861 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
863 editor = {Julliand, Jacques},
864 address = {Besan\c{c}on, France},
873 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
874 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
875 journal = {Journal of the Brazilian Computer Society (JBCS)},
879 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
882 note = {ISSN 0104-6500},
887 @inproceedings{cddg+04:ip,
889 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
891 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
892 title = {Proving and Debugging Set-Based Specifications},
893 booktitle = {WMF'03 proceedings},
894 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
897 editor = {A. Cavalcanti and P. Machado},
898 address = {Campina Grande, Brazil},
899 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
906 @inproceedings{cdgr04:onp,
908 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
909 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
911 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
912 address = {Besan\c{c}on, France},
915 editor = {Julliand, Jacques},
916 note = {Session outils},
921 @INPROCEEDINGS{CGK05,
922 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
923 title = {A uniform deductive approach for parameterized protocol safety},
927 bibsource = {DBLP, http://dblp.uni-trier.de},
928 crossref = {DBLP:conf/kbse/2005},
929 ee = {http://doi.acm.org/10.1145/1101908.1101971}
932 @INPROCEEDINGS{abcvs05,
933 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
934 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
936 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
940 address = {Guelph, Canada},
942 note = {ISSN 1492-8760}
946 author = {Bahi, J. M.},
947 title = {Boolean totally asynchronous iterations},
955 author = {Bahi, J. M. and Contassot-Vivier, S.},
956 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
966 author = {Bahi, J. M. and Contassot-Vivier, S.},
967 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
972 pages = {1353--1363},
977 @inproceedings{bcgr11:ip,
979 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
982 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
983 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
984 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
988 doi = {10.1007/978-3-642-22953-4_11},
989 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
990 address = {Oslo, Norway},
998 @techreport{BCVC10:ir,
999 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
1000 title = {Convergence Results of Combining Synchronism and Asynchronism for
1001 Discrete-State Discrete-Time Dynamic Network},
1003 institution = {LIFC - Laboratoire d’{I}nformatique de
1004 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1005 type = {Research Report},
1006 number = {RR2010-02},
1007 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
1011 @techreport{Cou10:ir,
1012 author = {Couchot, J.-F.},
1013 title = {Formal {C}onvergence {P}roof for {D}iscrete
1014 {D}ynamical {S}ystems},
1015 institution = {LIFC - Laboratoire d’{I}nformatique de
1016 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1017 type = {Research Report},
1018 number = {RR2010-03},
1019 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
1027 author = {Bahi, J. M. and Michel, C.},
1028 title = {Convergence of discrete asynchronous iterations},
1029 journal = {International Journal Computer Mathematics},
1036 author = {Bahi, J. M. and Michel, C.},
1037 title = {Simulations of asynchronous evolution of discrete systems},
1038 journal = {Simulation Practice and Theory},
1046 author = {G\'{e}rard M. Baudet},
1047 title = {Asynchronous Iterative Methods for Multiprocessors},
1053 doi = {http://doi.acm.org/10.1145/322063.322067},
1059 title = {Parallel and distributed computation: numerical methods},
1060 publisher = prenticeHall,
1062 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1063 isbn = {0-13-648700-9}
1067 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
1068 title = {The software model checker Blast},
1076 @INPROCEEDINGS{LeCun85,
1077 author = {Y Le~Cun},
1078 title = {A learning scheme for threshold networks},
1079 booktitle = {Cognitiva'95},
1082 address = {Paris, France}
1086 author = {Jeffrey L. Elman},
1087 title = {Finding Structure in Time},
1088 journal = {Cognitive Science},
1095 author = {Andreas Frommer and Daniel B. Szyld},
1096 title = {On asynchronous iterations},
1102 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
1104 publisher = elsevier
1108 author = {Goles Ch., E. and Salinas,L.},
1109 title = {Comparison between parallel and serial dynamics of Boolean networks},
1118 title = {The SPIN Model Checker: Primer and Reference Manual},
1119 publisher = {Addison-Wesley, Pearson Education},
1121 author = {Gerard J. Holzmann}
1125 author = {Shih M.-H. and Ho, J.-L.},
1126 title = {Solution of the Boolean Markus-Yamabe Problem},
1127 journal = advapplMath,
1135 author = {Adrien Richard},
1136 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1138 journal = advapplMath,
1143 publisher = elsevier
1147 author = {Adrien Richard and Jean-Paul Comet},
1148 title = {Necessary conditions for multistationarity in discrete dynamical
1150 journal = discreteapplMath,
1153 pages = {2403--2413},
1156 publisher = elsevier
1160 title = {Les syst\`emes dynamiques discrets},
1161 publisher = springer,
1163 author = {F. Robert},
1165 series = {Math\'ematiques et Applications}
1169 author = {Shih, M.-H. and Dong J.-L.},
1170 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1171 journal = advapplMath,
1180 author = {Thomas, R.},
1181 title = {Boolean Formalization of Genetic Control Circuits},
1189 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1190 title = {Absence of Cycles in Symmetric Neural Networks},
1194 pages = {1235-1249},
1196 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1199 @PROCEEDINGS{DBLP:conf/cav/2002,
1200 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1201 Denmark, July 27-31, 2002, Proceedings},
1203 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1206 publisher = springer,
1210 @PROCEEDINGS{DBLP:conf/kbse/2005,
1211 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1212 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1214 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1216 bibsource = {DBLP, http://dblp.uni-trier.de},
1221 author = {Ben-Ari, Mordechai},
1223 title = {Principles of the Spin Model Checker},
1224 isbn = {1846287693, 9781846287695}},
1225 publisher = springer,
1229 @INPROCEEDINGS{Wei97,
1230 author = {Weise,Carsten},
1231 title = {An incremental formal semantics for {PROMELA}},
1232 booktitle = {SPIN97, the Third SPIN Workshop},
1237 @PHDTHESIS{Couchot-PhD06,
1238 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1239 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1242 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1243 TYPE = {Th\`ese de {D}octorat},
1248 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1249 Page, M. and Tewfik, S. and Geiselmann, J.},
1250 title = {Qualitative simulation of genetic regulatory networks
1251 using piecewise-linear models},
1252 journal = {Bull. Math. Biol.},
1264 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1265 title = {A Fruitful Application of Formal Methods to Biological
1266 Regulatory Networks: Extending {T}homas' Asynchronous
1267 Logical Approach with Temporal Logic},
1268 journal = {J. Theor. Biol.},
1278 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1279 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1280 journal = {Biosystems},
1292 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1294 title = {Genetic Network Analyzer: qualitative simulation
1295 of genetic regulatory networks.},
1296 journal = {Bioinformatics},
1304 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1305 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1306 journal = {Genes, Genomes and Genomics},
1318 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1319 title = {Analysing formal models of genetic regulatory networks with delays},
1320 journal = {Int. J. Bioinformatics Res. Appl.},
1326 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1327 publisher = {Inderscience Publishers},
1328 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1331 author = {Richard, A.},
1332 title = {Local negative circuits and fixed points in Boolean networks},
1333 institution = {preprint arXiv number 0910.0750},
1346 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1347 title = {Graphic requirement for multistability and attractive cycles in a
1348 Boolean dynamical framework},
1349 journal = {Advances in Applied Mathematics},
1355 timestamp = {2009.02.05}
1358 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1359 author = {Jacques M. Bahi and
1360 Sylvain Contassot-Vivier and
1364 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1365 in Heterogeneous Environments},
1366 booktitle = {ICANN (2)},
1369 ee = {http://dx.doi.org/10.1007/11840930_81},
1370 crossref = {DBLP:conf/icann/2006-2},
1371 bibsource = {DBLP, http://dblp.uni-trier.de}
1374 @proceedings{DBLP:conf/icann/2006-2,
1375 editor = {Stefanos D. Kollias and
1376 Andreas Stafylopatis and
1379 title = {Artificial Neural Networks - ICANN 2006, 16th International
1380 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1382 booktitle = {ICANN (2)},
1383 publisher = {Springer},
1384 series = {Lecture Notes in Computer Science},
1387 isbn = {3-540-38871-0},
1388 bibsource = {DBLP, http://dblp.uni-trier.de}
1395 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1397 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1398 publisher = {Eyrolles},
1416 title = {An Introduction to Chaotic Dynamical Systems},
1417 publisher = {Redwood City: Addison-Wesley},
1419 author = {R. L. Devaney},
1422 timestamp = {27/01/2008}
1428 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1430 classement = {ACLI},
1431 impact-factor ={1.255},
1432 isi-acro = {MECHATRONICS},
1433 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1434 title = {Active {MEMS}-based flow control using artificial neural network},
1435 journal = {Mechatronics},
1439 doi = {10.1016/j.mechatronics.2013.02.010},
1440 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1441 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1442 publisher = {Elsevier},
1445 note = {Available online. Paper version to appear},
1450 @inproceedings{cds12:ip,
1452 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1454 classement = {ACTI},
1455 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1456 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1457 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1459 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1460 address = {Besan\c{c}on, France},
1461 publisher = {IEEE CPS},
1470 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1472 classement = {ACLI},
1473 impact-factor ={2.081},
1475 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1476 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1477 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1480 pages = {013122-1 -- 013122-9},
1481 doi = {10.1063/1.3685524},
1482 url = {http://dx.doi.org/10.1063/1.3685524},
1483 publisher = {American Institute of Physics},
1491 @inproceedings{bgs11:ip,
1493 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1495 classement = {ACTI},
1496 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1497 title = {Building a Chaotic Proven Neural Network},
1498 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1499 address = {Maldives, Maldives},
1505 author = {Bahi, Jacques M. and Guyeux, Christophe},
1506 title = {Hash Functions Using Chaotic Iterations},
1507 journal = {Journal of Algorithms \& Computational Technology},
1512 classement = {ACLNI},
1513 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1515 impact-factor = {#},
1522 @PHDTHESIS{GuyeuxThese10,
1523 author = {Christophe Guyeux},
1524 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1525 en s\'{e}curit\'{e} informatique},
1526 school = {Universit\'{e} de Franche-Comt\'{e}},
1528 owner = {christophe},
1529 timestamp = {2010.12.21}
1532 @INPROCEEDINGS{gfb10:ip,
1533 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1534 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1535 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1536 Multimedia Signal Processing},
1539 address = {Darmstadt, Germany},
1541 classement = {ACTI},
1542 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1549 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1550 title = {Topological entropy},
1551 journal = {Transactions of the American Mathematical Society},
1556 timestamp = {2008.05.29}
1560 author = {Rufus Bowen},
1561 title = {Entropy for group endomorphisms and homogeneous spaces},
1562 journal = {Transactions of the American Mathematical Society},
1567 timestamp = {15/02/2008}
1570 @article{10.1109/CIMSiM.2010.36,
1571 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1572 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1573 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1577 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1578 publisher = {IEEE Computer Society},
1579 address = {Los Alamitos, CA, USA},
1581 @article{10.1109/ICME.2003.1221665,
1582 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1583 title = {Neural network based steganalysis in still images},
1584 journal ={Multimedia and Expo, IEEE International Conference on},
1588 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1589 publisher = {IEEE Computer Society},
1590 address = {Los Alamitos, CA, USA},
1593 @ARTICLE{Sullivan06steganalysisfor,
1594 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1595 title = {Steganalysis for Markov cover data with applications to images},
1596 journal = {IEEE Transactions on Information Forensics and Security},
1605 author = "Gray, Frank",
1606 title = "Pulse code communication",
1607 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1612 @INPROCEEDINGS{guyeux10ter,
1613 author = {Bahi, Jacques M. and Guyeux, Christophe},
1614 title = {A new chaos-based watermarking algorithm},
1615 booktitle = {SECRYPT'10, International Conference on Security
1619 address = {Athens, Greece},
1621 publisher = {SciTePress},
1622 classement = {ACTI},
1623 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1629 @inproceedings{Qiao:2009:SM:1704555.1704664,
1630 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1631 title = {Steganalysis of MP3Stego},
1632 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1633 series = {IJCNN'09},
1635 location = {Atlanta, Georgia, USA},
1636 pages = {2723--2728},
1638 publisher = {IEEE Press}
1641 @inproceedings{CouchotD07IFM,
1643 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1646 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1647 title = {Guiding the Correction of Parameterized Specifications},
1648 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1652 publisher = {Springer},
1653 doi = {10.1007/978-3-540-73210-5_10},
1654 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1655 address = {Oxford, UK},
1661 @inproceedings{couchot07FTP,
1665 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1666 title = {A Graph-based Strategy for the Selection of Hypotheses},
1667 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1668 address = {Liverpool, UK},
1675 @inproceedings{cgs09:ip,
1677 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1679 classement = {ACTI},
1680 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1681 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1682 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1683 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1684 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1685 publisher = {ACM Press},
1687 url = {http://arxiv.org/abs/0907.1357},
1688 otherUrl = {http://hal.inria.fr/inria-00402204},
1689 address = {Grenoble, France},
1690 editor = {Hassen Sa\"{i}di and N. Shankar},
1697 @inproceedings{couchot07cade,
1701 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1702 title = {Handling Polymorphism in Automated Deduction},
1703 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1707 publisher = {Springer},
1708 isbn = {978-3-540-73594-6},
1709 doi = {10.1007/978-3-540-73595-3_18},
1710 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1711 address = {Bremen, Germany},
1723 @inproceedings{BCDG07,
1725 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1726 equipe = {vesontio},
1727 classement = {ACTI},
1728 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1729 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1730 booktitle = {B'2007, the 7th Int. B Conference},
1734 publisher = {Springer},
1735 doi = {10.1007/11955757_10},
1736 url = {http://dx.doi.org/10.1007/11955757_10},
1737 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1738 address = {Besancon, France},
1746 @article{byrd1995limited,
1747 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1748 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1749 journal = {SIAM J. Sci. Comput.},
1750 issue_date = {Sept. 1995},
1756 pages = {1190--1208},
1758 url = {http://dx.doi.org/10.1137/0916069},
1759 doi = {10.1137/0916069},
1761 publisher = {Society for Industrial and Applied Mathematics},
1762 address = {Philadelphia, PA, USA},
1763 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1766 @article{ANU:1770520,
1767 author = {Powell,M. J. D.},
1768 title = {Direct search algorithms for optimization calculations},
1769 journal = {Acta Numerica},
1776 doi = {10.1017/S0962492900002841},
1777 URL = {http://journals.cambridge.org/article_S0962492900002841},
1783 journal={The Journal of Supercomputing},
1786 doi={10.1007/s11227-010-0500-5},
1787 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1788 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1789 publisher={Springer US},
1790 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1791 author={Wang, Honggang},
1797 author={Yifeng He and Lee, I. and Ling Guan},
1798 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1799 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1804 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1805 doi={10.1109/TCSVT.2009.2017411},
1809 author={Palomar, D.P. and Mung Chiang},
1810 journal={Selected Areas in Communications, IEEE Journal on},
1811 title={A tutorial on decomposition methods for network utility maximization},
1816 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1817 doi={10.1109/JSAC.2006.879350},
1822 journal={EURASIP Journal on Information Security},
1826 doi={10.1186/1687-417X-2014-1},
1827 title={Universal distortion function for steganography in an arbitrary domain},
1828 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1829 publisher={Springer International Publishing},
1830 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1838 @inproceedings{conf/wifs/HolubF12,
1839 added-at = {2013-01-23T00:00:00.000+0100},
1840 author = {Holub, Vojtech and Fridrich, Jessica J.},
1841 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1843 crossref = {conf/wifs/2012},
1844 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1845 interhash = {cbef658a6868216eef585dd759ae0668},
1846 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1847 isbn = {978-1-4673-2285-0},
1851 timestamp = {2013-01-23T00:00:00.000+0100},
1852 title = {Designing steganographic distortion using directional filters.},
1853 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1857 @proceedings{conf/wifs/2012,
1858 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
1859 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
1860 publisher = {{IEEE}},
1862 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
1863 isbn = {978-1-4673-2285-0},
1864 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
1865 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
1866 bibsource = {dblp computer science bibliography, http://dblp.org}
1870 @article{FillerJF11,
1871 author = {Tom{\'a}s Filler and
1873 Jessica J. Fridrich},
1874 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1876 journal = {IEEE Transactions on Information Forensics and Security},
1881 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1882 bibsource = {DBLP, http://dblp.uni-trier.de}
1885 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1886 editor = {Ira S. Moskowitz},
1887 author = {Shelby Pereira and
1888 Sviatoslav Voloshynovskiy and
1890 St{\'e}phane Marchand-Maillet and
1892 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1893 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1894 title = {Second Generation Benchmarking and Application Oriented
1899 publisher = springer,
1900 address = springer_loc,
1906 @inproceedings{DBLP:conf/ih/Westfeld01,
1907 added-at = {2011-06-28T00:00:00.000+0200},
1908 author = {Westfeld, Andreas},
1909 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1910 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1911 editor = {Ira S. Moskowitz},
1913 publisher = springer,
1914 address = springer_loc,
1917 title = {F5-A Steganographic Algorithm.},
1926 @article{Chang20101286,
1927 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1928 journal = "Digital Signal Processing",
1931 pages = "1286 - 1307",
1935 doi = "10.1016/j.dsp.2009.11.005",
1936 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1937 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1938 keywords = "Security",
1939 keywords = "Wet paper coding",
1940 keywords = "Steganography",
1941 keywords = "Indicator",
1942 keywords = "Fuzzy edge detector"
1947 @article{Hu:2007:HPE:1282866.1282944,
1948 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1949 title = {A high performance edge detector based on fuzzy inference rules},
1950 journal = {Inf. Sci.},
1951 issue_date = {November, 2007},
1957 pages = {4768--4784},
1959 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1960 doi = {10.1016/j.ins.2007.04.001},
1962 publisher = {Elsevier Science Inc.},
1963 address = {New York, NY, USA},
1964 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1968 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1969 author = {Sorina Dumitrescu and
1971 editor = {Ahmet M. Eskicioglu and
1972 Jessica J. Fridrich and
1974 title = {LSB steganalysis based on high-order statistics},
1975 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1976 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1979 address = {New York, NY, USA},
1982 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1983 bibsource = {DBLP, http://dblp.uni-trier.de}
1986 @inproceedings{DBLP:conf/ih/Ker05,
1987 author = {Andrew D. Ker},
1988 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1989 editor = {Mauro Barni and
1990 Jordi Herrera-Joancomart\'{\i} and
1991 Stefan Katzenbeisser and
1992 Fernando P{\'e}rez-Gonz{\'a}lez},
1993 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1994 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1997 ee = {http://dx.doi.org/10.1007/11558859_22},
1998 publisher = springer,
1999 address = springer_loc,
2006 @inproceedings{FK12,
2007 editor = {Matthias Kirchner and
2009 booktitle = {Information Hiding - 14th International Conference, IH 2012,
2010 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
2011 author = {Jessica J. Fridrich and
2013 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
2017 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
2019 publisher = springer,
2020 address = springer_loc,
2022 bibsource = {DBLP, http://dblp.uni-trier.de}
2026 @article{DBLP:journals/tsp/DumitrescuWW03,
2027 added-at = {2012-02-06T00:00:00.000+0100},
2028 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
2029 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
2030 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
2031 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
2032 intrahash = {556caad9b61980d3458885153a52321c},
2033 journal = {IEEE Transactions on Signal Processing},
2036 pages = {1995-2007},
2037 timestamp = {2012-02-06T00:00:00.000+0100},
2038 title = {Detection of LSB steganography via sample pair analysis.},
2039 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
2047 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
2048 editor = {Nicolas D. Georganas and
2049 Radu Popescu-Zeletin},
2050 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
2051 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
2053 author = {Jessica J. Fridrich and
2056 title = {Reliable detection of LSB steganography in color and grayscale
2060 ee = {http://doi.acm.org/10.1145/1232454.1232466},
2062 address = {New York, NY, USA},
2064 bibsource = {DBLP, http://dblp.uni-trier.de}
2071 @inproceedings{DBLP:conf/ih/PevnyFB10,
2072 author = {Tom{\'a}s Pevn{\'y} and
2073 Tom{\'a}s Filler and
2075 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
2077 editor = {Rainer B{\"o}hme and
2078 Philip W. L. Fong and
2079 Reihaneh Safavi-Naini},
2080 booktitle = {Information Hiding - 12th International Conference, IH 2010,
2081 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2086 publisher = springer,
2087 address = springer_loc,
2090 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
2091 bibsource = {DBLP, http://dblp.uni-trier.de}
2100 author = {Tom{\'a}s Pevn{\'y} and
2101 Tom{\'a}s Filler and
2104 title = {Break Our Steganographic System},
2105 OPThowpublished = {},
2108 note = {Available at \url{http://www.agents.cz/boss/}},
2112 @proceedings{DBLP:conf/ih/2010,
2113 editor = {Rainer B{\"o}hme and
2114 Philip W. L. Fong and
2115 Reihaneh Safavi-Naini},
2116 title = {Information Hiding - 12th International Conference, IH 2010,
2117 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2119 booktitle = {Information Hiding},
2120 publisher = springer,
2121 address = springer_loc,
2125 isbn = {978-3-642-16434-7},
2126 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
2127 bibsource = {DBLP, http://dblp.uni-trier.de}
2131 @article{DBLP:journals/eswa/ChenCL10,
2132 added-at = {2010-07-21T15:44:10.000+0200},
2133 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2134 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2135 date = {2010-05-03},
2136 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2137 interhash = {bc34a5f04661fee24ee62c39e76361be},
2138 intrahash = {28889a4ab329da28559f0910469f054b},
2139 journal = {Expert Systems with Applications},
2142 pages = {3292-3301},
2143 timestamp = {2010-07-21T15:44:10.000+0200},
2144 title = {High payload steganography mechanism using hybrid edge detector.},
2145 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2150 @article{DBLP:journals/tifs/FillerJF11,
2151 added-at = {2011-09-29T00:00:00.000+0200},
2152 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2153 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2154 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2155 interhash = {b27d23ed0c9936d568e16c51378abccd},
2156 intrahash = {50e43c05a74eec17524b3df8db442da5},
2157 journal = {IEEE Transactions on Information Forensics and Security},
2161 timestamp = {2011-09-29T00:00:00.000+0200},
2162 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2163 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2171 @inproceedings{DBLP:conf/ih/KimDR06,
2172 added-at = {2007-09-20T00:00:00.000+0200},
2173 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2174 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2175 booktitle = {Information Hiding},
2176 crossref = {DBLP:conf/ih/2006},
2177 date = {2007-09-20},
2178 description = {dblp},
2179 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2180 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2181 interhash = {399aab122b39cfd6f6e951a1b276c786},
2182 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2183 isbn = {978-3-540-74123-7},
2187 publisher = springer,
2188 address = springer_loc,
2190 timestamp = {2007-09-20T00:00:00.000+0200},
2191 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2192 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2198 @proceedings{DBLP:conf/ih/2006,
2199 editor = {Jan Camenisch and
2200 Christian S. Collberg and
2203 title = {Information Hiding, 8th International Workshop, IH 2006,
2204 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2205 booktitle = {Information Hiding},
2206 publisher = springer,
2207 address = springer_loc,
2211 isbn = {978-3-540-74123-7},
2212 bibsource = {DBLP, http://dblp.uni-trier.de}
2217 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2218 author = {Jessica J. Fridrich and
2219 Tom{\'a}s Pevn{\'y} and
2221 title = {Statistically undetectable jpeg steganography: dead ends
2222 challenges, and opportunities},
2224 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2225 editor = {Deepa Kundur and
2226 Balakrishnan Prabhakaran and
2228 Jessica J. Fridrich},
2229 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2230 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2232 address = {New York, NY, USA},
2235 isbn = {978-1-59593-857-2},
2236 bibsource = {DBLP, http://dblp.uni-trier.de}
2242 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2243 editor = {Nasir D. Memon and
2245 Adnan M. Alattar and
2247 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2248 Electronic Imaging Symposium, San Jose, CA, USA, January
2249 18-20, 2010, Proceedings},
2250 author = {Tom{\'a}s Filler and
2252 Jessica J. Fridrich},
2253 title = {Minimizing embedding impact in steganography using trellis-coded
2257 ee = {http://dx.doi.org/10.1117/12.838002},
2258 bibsource = {DBLP, http://dblp.uni-trier.de},
2262 series = {SPIE Proceedings},
2273 @proceedings{DBLP:conf/mediaforensics/2010,
2274 editor = {Nasir D. Memon and
2276 Adnan M. Alattar and
2278 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2279 Electronic Imaging Symposium, San Jose, CA, USA, January
2280 18-20, 2010, Proceedings},
2281 booktitle = {Media Forensics and Security},
2284 series = {SPIE Proceedings},
2287 isbn = {978-0-8194-7934-1},
2288 bibsource = {DBLP, http://dblp.uni-trier.de}
2291 @article{DBLP:journals/corr/abs-1112-5239,
2292 author = {Jacques M. Bahi and
2293 Rapha{\"e}l Couturier and
2294 Christophe Guyeux and
2295 Pierre-Cyrille H{\'e}am},
2296 title = {Efficient and Cryptographically Secure Generation of Chaotic
2297 Pseudorandom Numbers on GPU},
2299 volume = {abs/1112.5239},
2301 ee = {http://arxiv.org/abs/1112.5239},
2302 bibsource = {DBLP, http://dblp.uni-trier.de}
2306 author = {Ponomarenko, Nikolay},
2307 title = {PSNR-HVS-M page},
2308 OPThowpublished = {},
2311 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2317 author = {Bovik, Alan C.},
2318 title = {BIQI page},
2319 OPThowpublished = {},
2322 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2327 @InProceedings{PSECAL07,
2328 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2329 title = {On between-coefficient contrast masking of DCT basis functions},
2330 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2333 editor = {Li,Baoxin},
2339 OPTorganization = {},
2347 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2348 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2349 journal = {IEEE Signal Processing Letters},
2360 @inproceedings{DBLP:conf/crypto/ShubBB82,
2361 author = {Lenore Blum and
2364 title = {Comparison of Two Pseudo-Random Number Generators},
2365 editor = {David Chaum and
2366 Ronald L. Rivest and
2368 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2369 Barbara, California, USA, August 23-25, 1982},
2371 bibsource = {DBLP, http://dblp.uni-trier.de},
2372 publisher = {Plenum Press},
2373 address={New York, NY, USA},
2376 bibsource = {DBLP, http://dblp.uni-trier.de}
2380 @inproceedings{Blum:1985:EPP:19478.19501,
2381 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2382 Barbara, California, USA, August 19-22, 1984, Proceedings},
2383 author = {Manuel Blum and
2385 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2386 Which Hides All Partial Information},
2390 editor = {G. R. Blakley and
2392 publisher = springer,
2393 address = springer_loc,
2400 @article{DBLP:journals/ejisec/FontaineG07,
2401 author = {Caroline Fontaine and
2403 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2404 journal = {EURASIP Journal on Information Security},
2409 ee = {http://dx.doi.org/10.1155/2007/13801},
2410 bibsource = {DBLP, http://dblp.uni-trier.de}
2414 @article{Luo:2010:EAI:1824719.1824720,
2415 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2416 title = {Edge adaptive image steganography based on LSB matching revisited},
2417 journal = {IEEE Transactions on Information Forensics and Security},
2425 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2426 doi = {10.1109/TIFS.2010.2041812},
2428 publisher = {IEEE Press},
2429 address = {Piscataway, NJ, USA},
2430 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2433 @article{Mielikainen06,
2434 author = {Mielikainen, J.},
2435 title = {LSB Matching Revisited},
2436 journal = {IEEE Signal Processing Letters},
2451 @article{Liu:2008:FMP:1284917.1285196,
2452 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2453 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2454 journal = {Pattern Recogn.},
2455 issue_date = {January, 2008},
2463 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2464 doi = {10.1016/j.patcog.2007.06.005},
2466 publisher = {Elsevier Science Inc.},
2467 address = {New York, NY, USA},
2468 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2473 @InProceedings{LHS08,
2474 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2475 title = {Textural features based universal steganalysis},
2478 booktitle = {Proc. SPIE 6819},
2489 OPTorganization = {},
2496 @InProceedings{KF11,
2497 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2498 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2501 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2505 pages = {78800L-78800L-13},
2514 OPTorganization = {},
2520 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2521 author = {Jan Kodovský and
2523 Jessica J. Fridrich},
2524 title = {Modern steganalysis can detect YASS.},
2525 booktitle = {Media Forensics and Security},
2528 ee = {http://dx.doi.org/10.1117/12.838768}
2531 @article{DBLP:journals/tifs/KodovskyFH12,
2532 author = {Jan Kodovsk{\'y} and
2533 Jessica J. Fridrich and
2535 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2536 journal = {IEEE Transactions on Information Forensics and Security},
2541 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2542 bibsource = {DBLP, http://dblp.uni-trier.de}
2547 @article{Fillatre:2012:ASL:2333143.2333587,
2548 author = {Fillatre, Lionel},
2549 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2550 journal = {IEEE Transactions on Signal Processing},
2558 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2559 doi = {10.1109/TSP.2011.2174231},
2561 publisher = {IEEE Press},
2562 address = {Piscataway, NJ, USA},
2566 @inproceedings{Tyan1993,
2567 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2568 address = ieecs_loc,
2570 author = {Tyan, C. Y. and Wang, P. P.},
2571 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2572 citeulike-article-id = {7936501},
2573 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2575 posted-at = {2010-10-01 17:27:48},
2578 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2584 @article{Canny:1986:CAE:11274.11275,
2585 author = {Canny, J},
2586 title = {A Computational Approach to Edge Detection},
2587 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2588 issue_date = {June 1986},
2596 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2597 doi = {10.1109/TPAMI.1986.4767851},
2599 publisher = {IEEE Computer Society},
2600 address = {Washington, DC, USA},
2601 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2605 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2606 author = {Jessica J. Fridrich and
2607 Jan Kodovsk{\'y} and
2610 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2612 booktitle = {Information Hiding},
2615 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2616 crossref = {DBLP:conf/ih/2011},
2617 bibsource = {DBLP, http://dblp.uni-trier.de}
2619 @proceedings{DBLP:conf/ih/2011,
2620 editor = {Tom{\'a}s Filler and
2621 Tom{\'a}s Pevn{\'y} and
2624 title = {Information Hiding - 13th International Conference, IH 2011,
2625 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2627 booktitle = {Information Hiding},
2628 publisher = springer,
2629 address = springer_loc,
2633 isbn = {978-3-642-24177-2},
2634 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2635 bibsource = {DBLP, http://dblp.uni-trier.de}
2638 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2639 author = {Jessica J. Fridrich},
2640 title = {Modern Trends in Steganography and Steganalysis},
2644 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2645 crossref = {DBLP:conf/iwdw/2011},
2646 bibsource = {DBLP, http://dblp.uni-trier.de}
2648 @proceedings{DBLP:conf/iwdw/2011,
2649 editor = {Yun-Qing Shi and
2650 Hyoung-Joong Kim and
2651 Fernando P{\'e}rez-Gonz{\'a}lez},
2652 title = {Digital Forensics and Watermarking - 10th International
2653 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2654 2011, Revised Selected Papers},
2656 publisher = springer,
2657 address = springer_loc,
2661 isbn = {978-3-642-32204-4},
2662 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2663 bibsource = {DBLP, http://dblp.uni-trier.de}
2669 @article{MCErlang07,
2670 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2671 title = {McErlang: a model checker for a distributed functional programming language},
2672 journal = {SIGPLAN Not.},
2681 @inproceedings{Bogor03,
2683 Matthew B. Dwyer and
2685 title = {Bogor: an extensible and highly-modular software model checking
2687 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2688 of Software Engineering 2003},
2696 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2697 title = {On Devaney's Definition of Chaos},
2698 journal = {Amer. Math. Monthly},
2704 timestamp = {27/01/2008}
2707 @article{Crook2007267,
2708 title = "Pattern recall in networks of chaotic neurons",
2709 journal = "Biosystems",
2712 pages = "267 - 274",
2715 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2716 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2718 keywords = "Spiking neural network"
2722 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2723 title = {A novel Hash algorithm construction based on chaotic neural network},
2724 journal = {Neural Computing and Applications},
2727 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2730 keyword = {Computer Science},
2731 publisher = {Springer London}
2735 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2736 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2742 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2743 doi={10.1109/TCE.2004.1309431},
2746 @article{Zhang2005759,
2747 title = "An image encryption approach based on chaotic maps",
2748 journal = "Chaos, Solitons \& Fractals",
2751 pages = "759 - 765",
2755 doi = "10.1016/j.chaos.2004.09.035",
2756 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2759 @article{Lian20091296,
2760 title = "A block cipher based on chaotic neural networks",
2761 journal = "Neurocomputing",
2764 pages = "1296 - 1301",
2767 author = "Shiguo Lian",
2768 keywords = "Neural network",
2770 keywords = "Security",
2771 keywords = "Block cipher",
2772 keywords = "Image encryption"
2776 author = {George Cybenko},
2777 title = {Approximation by Superpositions of a Sigmoidal function},
2778 journal = {Mathematics of Control, Signals and Systems},
2785 @article{DBLP:journals/nn/HornikSW89,
2786 author = {Kurt Hornik and
2787 Maxwell B. Stinchcombe and
2789 title = {Multilayer feedforward networks are universal approximators},
2790 journal = {Neural Networks},
2795 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2796 bibsource = {DBLP, http://dblp.uni-trier.de}
2799 @article{dalkiran10,
2800 author = {Ilker Dalkiran and Kenan Danisman},
2801 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2802 title = {Artificial neural network based chaotic generator for cryptology},
2810 @article{springerlink:10.1007/s00521-010-0432-2,
2811 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2812 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2813 title = {A novel Hash algorithm construction based on chaotic neural network},
2814 journal = {Neural Computing and Applications},
2815 publisher = {Springer},
2817 keyword = {Computer Science},
2823 @article{Feder2009NTB,
2824 author = {Feder, Tom\'{a}s and Subi, Carlos},
2825 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2826 journal = {Inf. Process. Lett.},
2827 issue_date = {February, 2009},
2835 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2836 doi = {10.1016/j.ipl.2008.10.015},
2838 publisher = {Elsevier North-Holland, Inc.},
2839 address = {Amsterdam, The Netherlands, The Netherlands},
2840 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2846 author={Zanten, A.~J.~van and Suparta, I.~N.},
2847 title={ Totally balanced and exponentially balanced Gray codes},
2848 journal={Discrete Analysis and Operational Research},
2856 @book{LevinPeresWilmer2006,
2857 added-at = {2010-01-19T17:51:27.000+0100},
2858 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2859 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2860 interhash = {61354795a6accb6407bfdbf04753a683},
2861 intrahash = {097dc4d1d0e412b2444f540b04110797},
2862 keywords = {markovchains probabilitytheory textbook},
2863 publisher = {American Mathematical Society},
2864 timestamp = {2010-01-19T17:51:27.000+0100},
2865 title = {{Markov chains and mixing times}},
2866 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2871 author = {M. Mitzenmacher and Eli Upfal},
2873 title = {Probability and Computing},
2874 publisher = {Cambridge University Press},
2880 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2883 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2884 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2885 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
2891 @article{Robinson:1981:CS,
2892 author = {Robinson, John P. and Cohn, Martin},
2893 title = {Counting Sequences},
2894 journal = {IEEE Trans. Comput.},
2895 issue_date = {January 1981},
2903 url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
2905 publisher = {IEEE Computer Society},
2906 address = {Washington, DC, USA},
2907 keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
2909 @article{DBLP:journals/combinatorics/BhatS96,
2910 author = {Girish S. Bhat and
2912 title = {Balanced Gray Codes},
2913 journal = {Electr. J. Comb.},
2917 url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
2918 timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
2919 biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
2920 bibsource = {dblp computer science bibliography, http://dblp.org}