1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @inproceedings{mansingka2013fibonacci,
5 title={Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System},
6 author={Mansingka, Abhinav S and Barakat, Mohamed L and Zidan, M Affan and Radwan, Ahmed G and Salama, Khaled N},
7 booktitle={IT Convergence and Security (ICITCS), 2013 International Conference on},
13 @article{Rossler1976397,
14 title = "An equation for continuous chaos",
15 journal = "Physics Letters A",
22 doi = "http://dx.doi.org/10.1016/0375-9601(76)90101-8",
23 url = "http://www.sciencedirect.com/science/article/pii/0375960176901018",
24 author = "O.E. Rössler",
29 @INPROCEEDINGS{6868789,
30 author={Dabal, Pawel and Pelka, Ryszard},
31 booktitle={Design and Diagnostics of Electronic Circuits Systems, 17th International Symposium on},
32 title={A study on fast pipelined pseudo-random number generator based on chaotic logistic map},
36 keywords={chaotic systems;logistic map;pseudo-random bit generator;system-on-chip},
37 doi={10.1109/DDECS.2014.6868789},}
40 @article{may1976simple,
41 title={Simple mathematical models with very complicated dynamics},
42 author={May, Robert M and others},
50 @article{Silva:2009:LLP:1592409.1592411,
51 author = {Silva, Rui Miguel and Crespo, Rui Gustavo and Nunes, Mario Serafim},
52 title = {LoBa128, a Lorenz\&\#45;Based PRNG for Wireless Sensor Networks},
53 journal = {Int. J. Commun. Netw. Distrib. Syst.},
54 issue_date = {August 2009},
62 url = {http://dx.doi.org/10.1504/IJCNDS.2009.027596},
63 doi = {10.1504/IJCNDS.2009.027596},
65 publisher = {Inderscience Publishers},
66 address = {Inderscience Publishers, Geneva, SWITZERLAND},
67 keywords = {PRNG, WSN, chaos cryptography, key management, pseudo\&\#45;random number generator, statistical attacks, symmetrical encryption, wireless networks, wireless sensor networks},
71 author = {{Lorenz}, E.~N.},
72 title = "{Deterministic Nonperiodic Flow.}",
73 journal = {Journal of Atmospheric Sciences},
78 doi = {10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2},
79 adsurl = {http://adsabs.harvard.edu/abs/1963JAtS...20..130L},
80 adsnote = {Provided by the SAO/NASA Astrophysics Data System}
85 @inproceedings{mao2006design,
86 title={Design and FPGA implementation of a pseudo-random bit sequence generator using spatiotemporal chaos},
87 author={Mao, Yaobin and Cao, Liu and Liu, Wenbo},
88 booktitle={Communications, Circuits and Systems Proceedings, 2006 International Conference on},
95 @article{merahcoupling13,
96 title={Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System-Study and Real Time FPGA Implementation},
97 author={Merah, Lahcene and ALI-PACHA, Adda and SAID, Naima HADJ},
102 journal={International Journal of Computer Science and Telecommunications}
106 @article{henon1976two,
107 title={A two-dimensional mapping with a strange attractor},
108 author={H{\'e}non, Michel},
109 journal={Communications in Mathematical Physics},
114 publisher={Springer}}
116 @inproceedings{liu2008improved,
117 title={An improved chaos-based stream cipher algorithm and its VLSI implementation},
118 author={Liu, Shubo and Sun, Jing and Xu, Zhengquan and Cai, Zhaohui},
119 booktitle={Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on},
126 @inproceedings{dabal2012fpga,
127 title={FPGA implementation of chaotic pseudo-random bit generators},
128 author={Dabal, Pawel and Pelka, Ryszard},
129 booktitle={Mixed Design of Integrated Circuits and Systems (MIXDES), 2012 Proceedings of the 19th International Conference},
134 @inproceedings{dabal2011chaos,
135 title={A chaos-based pseudo-random bit generator implemented in FPGA device},
136 author={Dabal, Pawel and Pelka, Ryszard},
137 booktitle={Design and Diagnostics of Electronic Circuits \& Systems (DDECS), 2011 IEEE 14th International Symposium on},
143 @book{wiggins2003introduction,
144 title={Introduction to applied nonlinear dynamical systems and chaos},
145 author={Wiggins, Stephen},
148 publisher={Springer Science \& Business Media}
151 @inproceedings{aagc+15:ip,
152 author = {Bassam AlKindy and
153 Bashar Al{-}Nuaimi and
154 Christophe Guyeux and
155 Jean{-}Fran{\c{c}}ois Couchot and
159 title = {Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm
160 for Inferring Well Supported Phylogenetic Trees},
161 booktitle = {Computational Intelligence Methods for Bioinformatics and Biostatistics
162 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
163 10-12, 2015, Revised Selected Papers},
166 crossref = {DBLP:conf/cibb/2015},
167 url = {http://dx.doi.org/10.1007/978-3-319-44332-4_13},
168 doi = {10.1007/978-3-319-44332-4_13},
169 timestamp = {Tue, 02 Aug 2016 16:01:45 +0200},
170 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/AlKindyAGCSAP15},
171 bibsource = {dblp computer science bibliography, http://dblp.org}
174 @proceedings{DBLP:conf/cibb/2015,
175 editor = {Claudia Angelini and
176 Paola M. V. Rancoita and
178 title = {Computational Intelligence Methods for Bioinformatics and Biostatistics
179 - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
180 10-12, 2015, Revised Selected Papers},
181 series = {Lecture Notes in Computer Science},
183 publisher = {Springer},
185 url = {http://dx.doi.org/10.1007/978-3-319-44332-4},
186 doi = {10.1007/978-3-319-44332-4},
187 isbn = {978-3-319-44331-7},
188 timestamp = {Tue, 02 Aug 2016 16:01:14 +0200},
189 biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/2015},
190 bibsource = {dblp computer science bibliography, http://dblp.org}
196 @inproceedings{DBLP:conf/apsipa/TanL14,
197 author = {Shunquan Tan and
199 title = {Stacked convolutional auto-encoders for steganalysis of digital images},
200 booktitle = {Asia-Pacific Signal and Information Processing Association Annual
201 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
205 crossref = {DBLP:conf/apsipa/2014},
206 url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
207 doi = {10.1109/APSIPA.2014.7041565},
208 timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
209 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
210 bibsource = {dblp computer science bibliography, http://dblp.org}
212 @proceedings{DBLP:conf/apsipa/2014,
213 title = {Asia-Pacific Signal and Information Processing Association Annual
214 Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
216 publisher = {{IEEE}},
218 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
219 isbn = {978-6-1636-1823-8},
220 timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
221 biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
222 bibsource = {dblp computer science bibliography, http://dblp.org}
225 @inproceeding{doi:10.1117/12.2083479,
226 author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
228 Deep learning for steganalysis via convolutional neural networks
230 journal = {Proc. SPIE},
233 pages = {94090J-94090J-10},
235 Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
238 doi = {10.1117/12.2083479},
239 URL = { http://dx.doi.org/10.1117/12.2083479},
245 @inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
246 author = {Dan Claudiu Ciresan and
249 Luca Maria Gambardella and
250 J{\"{u}}rgen Schmidhuber},
251 title = {Flexible, High Performance Convolutional Neural Networks for Image
253 booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
254 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
256 pages = {1237--1242},
258 crossref = {DBLP:conf/ijcai/2011},
259 url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
260 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
261 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
262 bibsource = {dblp computer science bibliography, http://dblp.org}
265 @proceedings{DBLP:conf/ijcai/2011,
266 editor = {Toby Walsh},
267 title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
268 on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
270 publisher = {{IJCAI/AAAI}},
272 isbn = {978-1-57735-516-8},
273 timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
274 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
275 bibsource = {dblp computer science bibliography, http://dblp.org}
279 @article{DBLP:journals/ftsig/DengY14,
280 author = {Li Deng and
282 title = {Deep Learning: Methods and Applications},
283 journal = {Foundations and Trends in Signal Processing},
288 url = {http://dx.doi.org/10.1561/2000000039},
289 doi = {10.1561/2000000039},
290 timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
291 biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
292 bibsource = {dblp computer science bibliography, http://dblp.org}
296 author="Bitar, Ahmad W.
298 and Couchot, Jean-Fran{\c{c}}ois
299 and Couturier, Rapha{\"e}l",
300 title="Blind digital watermarking in PDF documents using Spread Transform Dither Modulation",
303 abstract="In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.",
305 doi="10.1007/s11042-015-3034-2",
306 url="http://dx.doi.org/10.1007/s11042-015-3034-2",
307 journal={Multimedia Tools and Applications},
308 publisher={Springer US},
314 author = {Chen, Brian and Wornell, Gregory W.},
315 title = {Provably robust digital watermarking},
316 journal = {Proc. SPIE},
321 doi = {10.1117/12.371232},
322 URL = { http://dx.doi.org/10.1117/12.371232},
327 author={Darazi, R. and Hu, R. and Macq, B.},
328 booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
329 title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
332 keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
333 doi={10.1109/ICASSP.2010.5495455},
337 @INPROCEEDINGS{WLSYNW13,
338 author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
339 booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
340 title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
343 keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
344 doi={10.1109/ICIP.2013.6738931},
351 journal={Journal of VLSI signal processing systems for signal, image and video technology},
354 title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
355 publisher={Kluwer Academic Publishers},
356 keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
357 author={Chen, Brian and Wornell, Gregory W.},
362 author = {Wang, C. T. and Tsai, W. H. },
363 title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
366 booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
375 OPTorganization = {},
381 @article{DBLP:journals/sigpro/LeeT10,
382 author = {I{-}Shi Lee and
384 title = {A new approach to covert communication via {PDF} files},
385 journal = {Signal Processing},
390 url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
391 doi = {10.1016/j.sigpro.2009.07.022},
392 timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
393 biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
394 bibsource = {dblp computer science bibliography, http://dblp.org}
399 author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
400 title = {A Copyright Protection Scheme Based on PDF},
401 journal = {International Journal of Innovative Computing, Information and Control},
408 note = {ISSN 1349-4198},
413 author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
414 title = {Using Steganography to hide messages inside PDF files},
415 howpublished = {SSN Project Report},
421 @InProceedings{PD2008,
422 author = {POR, L. Y. and Delina, B.},
423 title = {Information Hiding: A New Approach in Text Steganography},
424 booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
433 OPTorganization = {},
439 @article{DBLP:journals/tifs/PevnyBF10,
440 author = {Tom{\'{a}}s Pevn{\'{y}} and
442 Jessica J. Fridrich},
443 title = {Steganalysis by subtractive pixel adjacency matrix},
444 journal = {{IEEE} Transactions on Information Forensics and Security},
449 url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
450 doi = {10.1109/TIFS.2010.2045842},
451 timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
452 biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
453 bibsource = {dblp computer science bibliography, http://dblp.org}
457 @INPROCEEDINGS{rifq/others03,
458 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
461 x-international-audience = {yes},
462 title = {{D}iscrimination power of measures of resemblance},
463 booktitle = {{IFSA}'03},
465 location = {Istanbul, Turkey}
469 @ARTICLE{Rifqi:2000:DPM:342947.342970,
470 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
473 x-international-audience = {yes},
474 title = {{D}iscrimination power of measures of comparison},
475 journal = {{F}uzzy {S}ets and {S}ystems},
483 @book{Anderberg-Cluster-1973,
484 added-at = {2008-10-29T00:31:48.000+0100},
485 author = {Anderberg, M. R.},
486 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
487 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
488 intrahash = {f586cc49441c591f06539d11d3e06006},
489 keywords = {cluster_analysis wismasys0809},
490 publisher = {Academic Press},
491 timestamp = {2008-10-29T00:31:48.000+0100},
492 title = {Cluster Analysis for Applications},
498 @article{yule1950introduction,
499 Author = {Yule, G.U. and Kendall, MG},
500 Date-Added = {2009-08-14 22:16:50 -0500},
501 Date-Modified = {2009-08-14 22:16:50 -0500},
502 Journal = {Statistics},
503 Title = {An Introduction to the Theory of},
507 @inproceedings{fgb11:ip,
509 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
512 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
513 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
514 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
516 address = {Sevilla, Spain},
517 editor = {Javier Lopez and Pierangela Samarati},
518 publisher = {SciTePress},
526 author = {Cayre, F. and Bas, P.},
527 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
528 journal = {IEEE Transactions on Information Forensics and Security},
533 doi = {10.1109/TIFS.2007.916006},
535 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
536 security, watermarking, Kerckhoffs-based embedding security classes,
537 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
538 steganography security, watermark-only-attack, watermarking, Security,
539 spread-spectrum (SS) watermarking},
541 timestamp = {2009.06.29}
543 @INPROCEEDINGS{Perez06,
544 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
545 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
547 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
559 author = {Cayre, F. and Fontaine, C. and Furon, T.},
560 title = {Watermarking security: theory and practice},
561 journal = {IEEE Transactions on Signal Processing},
564 pages = {3976--3987},
566 keywords = {blind source separation, cryptography, watermarking, Fisher information
567 matrix, blind source separation, cryptanalysis, information theory,
568 spread spectrum techniques, substitutive scheme, watermarking security,
569 Blind source separation, Fisher information matrix, equivocation,
570 security, watermarking}
575 @inproceedings{Shujun1,
576 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
577 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
578 Their Roles in Cryptography and Pseudo-Random Coding},
579 booktitle = {Cryptography and Coding, 8th IMA International Conference,
583 publisher = springer,
584 address = springer_loc,
592 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
595 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
596 title = {Random Walk in a N-cube Without Hamiltonian Cycle
597 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
599 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
607 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
610 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
611 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
612 howpublished = {in submission to the ACM Computing Surveys journal},
622 @inproceedings{couchot04:onp,
624 author = {Couchot, Jean-Fran\c{c}ois},
625 title = {V\'erification d'invariant par superposition},
626 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
627 address = {Calais, France},
628 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
629 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
630 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
631 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
640 @inproceedings{aangc+15:ip,
642 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
645 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
646 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
647 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
649 doi = {10.1007/978-3-319-16483-0_38},
650 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
653 address = {Granada, Spain},
664 @inproceedings{agcs+15:ip,
665 author = {Bassam AlKindy and
666 Christophe Guyeux and
667 Jean{-}Fran{\c{c}}ois Couchot and
669 Christian Parisod and
671 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well
672 Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core
674 booktitle = {Algorithms for Computational Biology - Second International Conference,
675 AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
678 crossref = {DBLP:conf/alcob/2015},
679 url = {http://dx.doi.org/10.1007/978-3-319-21233-3_7},
680 doi = {10.1007/978-3-319-21233-3_7},
681 timestamp = {Tue, 28 Jul 2015 14:46:16 +0200},
682 biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/AlKindyGCSPB15},
683 bibsource = {dblp computer science bibliography, http://dblp.org}
686 @proceedings{DBLP:conf/alcob/2015,
687 editor = {Adrian Horia Dediu and
688 Francisco Hern{\'{a}}ndez Quiroz and
689 Carlos Mart{\'{\i}}n{-}Vide and
690 David A. Rosenblueth},
691 title = {Algorithms for Computational Biology - Second International Conference,
692 AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
693 series = {Lecture Notes in Computer Science},
695 publisher = {Springer},
697 url = {http://dx.doi.org/10.1007/978-3-319-21233-3},
698 doi = {10.1007/978-3-319-21233-3},
699 isbn = {978-3-319-21232-6},
700 timestamp = {Tue, 28 Jul 2015 14:45:41 +0200},
701 biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/2015},
702 bibsource = {dblp computer science bibliography, http://dblp.org}
709 @inproceedings{bcg11:ip,
711 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
714 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
715 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
716 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
718 address = {Luxembourg, Luxembourg},
721 note = {Best paper award},
727 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
729 classement = {ACLNI},
732 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
733 title = {Quality analysis of a chaotic proven keyed hash function},
734 journal = {International Journal On Advances in Internet Technology},
745 author = {Jean{-}Fran{\c{c}}ois Couchot and
746 Rapha{\"{e}}l Couturier and
748 title = {{STABYLO:} steganography with adaptive, Bbs, and binary embedding
750 journal = {Annales des T{\'{e}}l{\'{e}}communications},
755 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
756 doi = {10.1007/s12243-015-0466-7},
757 timestamp = {Mon, 28 Sep 2015 12:42:01 +0200},
758 biburl = {http://dblp.uni-trier.de/rec/bib/journals/adt/CouchotCG15},
759 bibsource = {dblp computer science bibliography, http://dblp.org}
762 @inproceedings{fccg15:ip,
764 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
767 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
768 title = {Steganalyzer performances in operational contexts},
769 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
771 address = {Adelaide, Australia},
777 @inproceedings{accfg15:ip,
779 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
782 author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux},
783 title = {Performance Study of Steganalysis Techniques},
784 booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on},
793 @inproceedings{bcfg12a:ip,
795 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
798 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
799 title = {Application of Steganography for Anonymity through the Internet},
800 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
802 url = {http://arxiv.org/abs/1202.5302v1},
803 address = {Venice, Italy},
813 @inproceedings{bcfg+13:ip,
815 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
818 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
819 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
820 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
822 doi = {10.1109/IIH-MSP.2013.141},
823 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
824 address = {Beijing, China},
830 @inproceedings{bcfg12b:ip,
832 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
835 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
836 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
837 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
839 address = {Venice, Italy},
849 @inproceedings{bcg11b:ip,
851 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
854 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
855 title = {Steganography: a Class of Algorithms having Secure Properties},
856 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
858 address = {Dalian, China},
867 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
870 impact-factor ={1.363},
871 isi-acro = {COMPUT J},
872 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
873 title = {Steganography: a class of secure and robust algorithms},
874 journal = {The Computer Journal},
878 doi = {10.1093/comjnl/bxr116},
879 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
880 publisher = {Oxford University Press},
886 @inproceedings{bcgw11:ip,
888 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
891 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
892 title = {Class of Trustworthy Pseudo Random Number Generators},
893 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
895 address = {Luxembourg, Luxembourg},
903 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
906 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
907 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
908 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
918 @inproceedings{aagp+15:ip,
920 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
922 classement = {ACTIN},
923 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
924 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
925 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
927 address = {Naples, Italy},
935 @inproceedings{acgm+14:ij,
937 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
940 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
941 title = {Finding the Core-Genes of Chloroplasts},
942 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
944 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
946 doi = {10.7763/IJBBB.2014.V4.371},
947 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
948 address = {Copenhagen, Denmark},
958 @inproceedings{akgcs+14:oip,
960 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
963 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
964 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
965 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
966 address = {Belfast, United Kingdom},
970 note = {Short paper},
975 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
978 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
979 title = {Finding the core-genes of Chloroplast Species},
980 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
990 @PhdThesis{guyeuxphd,
991 author = {Guyeux, Christophe},
992 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
993 type = {Th\`ese de {D}octorat},
994 school = {LIFC, Universit\'e de Franche-Comt\'e},
996 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
997 month = {13 décembre},
1002 @inproceedings{chgw+14:oip,
1004 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
1006 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
1007 title = {Pseudorandom Number Generators with Balanced Gray Codes},
1008 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
1010 address = {Vienna, Austria},
1016 @inproceedings{ccfg16:ip,
1017 author = {Couchot, Jean-Fran\c{c}ois and
1018 Couturier, Rapha\"el and Fadil, Yousra Ahmed and Guyeux, Christophe},
1019 title = {A Second Order Derivatives based Approach for Steganography},
1020 booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
1031 @INPROCEEDINGS{nusmv02,
1032 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
1033 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
1034 Sebastiani and Armando Tacchella},
1035 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
1039 crossref = {DBLP:conf/cav/2002}
1043 author = {Nishanth Chandrasekaran},
1044 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
1048 @InProceedings{GO01,
1049 Author = "Gastin, P. and Oddoux, D.",
1050 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
1051 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
1052 Publisher = "Springer",
1059 @inproceedings{cg04:np,
1061 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
1062 title = {Analyse d'atteignabilit\'e d\'eductive},
1063 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
1065 editor = {Julliand, Jacques},
1066 address = {Besan\c{c}on, France},
1075 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1076 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
1077 journal = {Journal of the Brazilian Computer Society (JBCS)},
1081 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
1084 note = {ISSN 0104-6500},
1089 @inproceedings{cddg+04:ip,
1091 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1092 equipe = {vesontio},
1093 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1094 title = {Proving and Debugging Set-Based Specifications},
1095 booktitle = {WMF'03 proceedings},
1096 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
1099 editor = {A. Cavalcanti and P. Machado},
1100 address = {Campina Grande, Brazil},
1101 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
1108 @inproceedings{cdgr04:onp,
1110 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
1111 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
1113 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
1114 address = {Besan\c{c}on, France},
1117 editor = {Julliand, Jacques},
1118 note = {Session outils},
1123 @INPROCEEDINGS{CGK05,
1124 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
1125 title = {A uniform deductive approach for parameterized protocol safety},
1129 bibsource = {DBLP, http://dblp.uni-trier.de},
1130 crossref = {DBLP:conf/kbse/2005},
1131 ee = {http://doi.acm.org/10.1145/1101908.1101971}
1134 @INPROCEEDINGS{abcvs05,
1135 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
1136 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
1138 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
1142 address = {Guelph, Canada},
1144 note = {ISSN 1492-8760}
1148 author = {Bahi, J. M.},
1149 title = {Boolean totally asynchronous iterations},
1157 author = {Bahi, J. M. and Contassot-Vivier, S.},
1158 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1168 author = {Bahi, J. M. and Contassot-Vivier, S.},
1169 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
1174 pages = {1353--1363},
1179 @inproceedings{bcgr11:ip,
1181 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1183 classement = {ACTI},
1184 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
1185 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
1186 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
1190 doi = {10.1007/978-3-642-22953-4_11},
1191 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
1192 address = {Oslo, Norway},
1200 @techreport{BCVC10:ir,
1201 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
1202 title = {Convergence Results of Combining Synchronism and Asynchronism for
1203 Discrete-State Discrete-Time Dynamic Network},
1205 institution = {LIFC - Laboratoire d’{I}nformatique de
1206 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1207 type = {Research Report},
1208 number = {RR2010-02},
1209 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
1213 @techreport{Cou10:ir,
1214 author = {Couchot, J.-F.},
1215 title = {Formal {C}onvergence {P}roof for {D}iscrete
1216 {D}ynamical {S}ystems},
1217 institution = {LIFC - Laboratoire d’{I}nformatique de
1218 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
1219 type = {Research Report},
1220 number = {RR2010-03},
1221 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
1229 author = {Bahi, J. M. and Michel, C.},
1230 title = {Convergence of discrete asynchronous iterations},
1231 journal = {International Journal Computer Mathematics},
1238 author = {Bahi, J. M. and Michel, C.},
1239 title = {Simulations of asynchronous evolution of discrete systems},
1240 journal = {Simulation Practice and Theory},
1248 author = {G\'{e}rard M. Baudet},
1249 title = {Asynchronous Iterative Methods for Multiprocessors},
1255 doi = {http://doi.acm.org/10.1145/322063.322067},
1261 title = {Parallel and distributed computation: numerical methods},
1262 publisher = prenticeHall,
1264 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1265 isbn = {0-13-648700-9}
1269 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
1270 title = {The software model checker Blast},
1278 @INPROCEEDINGS{LeCun85,
1279 author = {Y Le~Cun},
1280 title = {A learning scheme for threshold networks},
1281 booktitle = {Cognitiva'95},
1284 address = {Paris, France}
1288 author = {Jeffrey L. Elman},
1289 title = {Finding Structure in Time},
1290 journal = {Cognitive Science},
1297 author = {Andreas Frommer and Daniel B. Szyld},
1298 title = {On asynchronous iterations},
1304 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
1306 publisher = elsevier
1310 author = {Goles Ch., E. and Salinas,L.},
1311 title = {Comparison between parallel and serial dynamics of Boolean networks},
1320 title = {The SPIN Model Checker: Primer and Reference Manual},
1321 publisher = {Addison-Wesley, Pearson Education},
1323 author = {Gerard J. Holzmann}
1327 author = {Shih M.-H. and Ho, J.-L.},
1328 title = {Solution of the Boolean Markus-Yamabe Problem},
1329 journal = advapplMath,
1337 author = {Adrien Richard},
1338 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
1340 journal = advapplMath,
1345 publisher = elsevier
1349 author = {Adrien Richard and Jean-Paul Comet},
1350 title = {Necessary conditions for multistationarity in discrete dynamical
1352 journal = discreteapplMath,
1355 pages = {2403--2413},
1358 publisher = elsevier
1362 title = {Les syst\`emes dynamiques discrets},
1363 publisher = springer,
1365 author = {F. Robert},
1367 series = {Math\'ematiques et Applications}
1371 author = {Shih, M.-H. and Dong J.-L.},
1372 title = {A combinatorial analogue of the Jacobian problem in automata networks},
1373 journal = advapplMath,
1382 author = {Thomas, R.},
1383 title = {Boolean Formalization of Genetic Control Circuits},
1391 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
1392 title = {Absence of Cycles in Symmetric Neural Networks},
1396 pages = {1235-1249},
1398 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
1401 @PROCEEDINGS{DBLP:conf/cav/2002,
1402 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
1403 Denmark, July 27-31, 2002, Proceedings},
1405 editor = {Ed Brinksma and Kim Guldstrand Larsen},
1408 publisher = springer,
1412 @PROCEEDINGS{DBLP:conf/kbse/2005,
1413 title = {20th IEEE/ACM International Conference on Automated Software Engineering
1414 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
1416 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
1418 bibsource = {DBLP, http://dblp.uni-trier.de},
1423 author = {Ben-Ari, Mordechai},
1425 title = {Principles of the Spin Model Checker},
1426 isbn = {1846287693, 9781846287695}},
1427 publisher = springer,
1431 @INPROCEEDINGS{Wei97,
1432 author = {Weise,Carsten},
1433 title = {An incremental formal semantics for {PROMELA}},
1434 booktitle = {SPIN97, the Third SPIN Workshop},
1439 @PHDTHESIS{Couchot-PhD06,
1440 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
1441 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
1444 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
1445 TYPE = {Th\`ese de {D}octorat},
1450 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
1451 Page, M. and Tewfik, S. and Geiselmann, J.},
1452 title = {Qualitative simulation of genetic regulatory networks
1453 using piecewise-linear models},
1454 journal = {Bull. Math. Biol.},
1466 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
1467 title = {A Fruitful Application of Formal Methods to Biological
1468 Regulatory Networks: Extending {T}homas' Asynchronous
1469 Logical Approach with Temporal Logic},
1470 journal = {J. Theor. Biol.},
1480 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
1481 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
1482 journal = {Biosystems},
1494 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1496 title = {Genetic Network Analyzer: qualitative simulation
1497 of genetic regulatory networks.},
1498 journal = {Bioinformatics},
1506 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1507 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1508 journal = {Genes, Genomes and Genomics},
1520 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1521 title = {Analysing formal models of genetic regulatory networks with delays},
1522 journal = {Int. J. Bioinformatics Res. Appl.},
1528 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1529 publisher = {Inderscience Publishers},
1530 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1533 author = {Richard, A.},
1534 title = {Local negative circuits and fixed points in Boolean networks},
1535 institution = {preprint arXiv number 0910.0750},
1548 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1549 title = {Graphic requirement for multistability and attractive cycles in a
1550 Boolean dynamical framework},
1551 journal = {Advances in Applied Mathematics},
1557 timestamp = {2009.02.05}
1560 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1561 author = {Jacques M. Bahi and
1562 Sylvain Contassot-Vivier and
1566 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1567 in Heterogeneous Environments},
1568 booktitle = {ICANN (2)},
1571 ee = {http://dx.doi.org/10.1007/11840930_81},
1572 crossref = {DBLP:conf/icann/2006-2},
1573 bibsource = {DBLP, http://dblp.uni-trier.de}
1576 @proceedings{DBLP:conf/icann/2006-2,
1577 editor = {Stefanos D. Kollias and
1578 Andreas Stafylopatis and
1581 title = {Artificial Neural Networks - ICANN 2006, 16th International
1582 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1584 booktitle = {ICANN (2)},
1585 publisher = {Springer},
1586 series = {Lecture Notes in Computer Science},
1589 isbn = {3-540-38871-0},
1590 bibsource = {DBLP, http://dblp.uni-trier.de}
1597 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1599 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1600 publisher = {Eyrolles},
1618 title = {An Introduction to Chaotic Dynamical Systems},
1619 publisher = {Redwood City: Addison-Wesley},
1621 author = {R. L. Devaney},
1624 timestamp = {27/01/2008}
1630 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1632 classement = {ACLI},
1633 impact-factor ={1.255},
1634 isi-acro = {MECHATRONICS},
1635 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1636 title = {Active {MEMS}-based flow control using artificial neural network},
1637 journal = {Mechatronics},
1641 doi = {10.1016/j.mechatronics.2013.02.010},
1642 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1643 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1644 publisher = {Elsevier},
1647 note = {Available online.}
1652 @inproceedings{cds12:ip,
1654 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1656 classement = {ACTI},
1657 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1658 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1659 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1661 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1662 address = {Besan\c{c}on, France},
1663 publisher = {IEEE CPS},
1672 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1674 classement = {ACLI},
1675 impact-factor ={2.081},
1677 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1678 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1679 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1682 pages = {013122-1 -- 013122-9},
1683 doi = {10.1063/1.3685524},
1684 url = {http://dx.doi.org/10.1063/1.3685524},
1685 publisher = {American Institute of Physics},
1693 @inproceedings{bgs11:ip,
1695 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1697 classement = {ACTI},
1698 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1699 title = {Building a Chaotic Proven Neural Network},
1700 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1701 address = {Maldives, Maldives},
1707 author = {Bahi, Jacques M. and Guyeux, Christophe},
1708 title = {Hash Functions Using Chaotic Iterations},
1709 journal = {Journal of Algorithms \& Computational Technology},
1714 classement = {ACLNI},
1715 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1717 impact-factor = {#},
1724 @PHDTHESIS{GuyeuxThese10,
1725 author = {Christophe Guyeux},
1726 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1727 en s\'{e}curit\'{e} informatique},
1728 school = {Universit\'{e} de Franche-Comt\'{e}},
1730 owner = {christophe},
1731 timestamp = {2010.12.21}
1734 @INPROCEEDINGS{gfb10:ip,
1735 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1736 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1737 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1738 Multimedia Signal Processing},
1741 address = {Darmstadt, Germany},
1743 classement = {ACTI},
1744 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1751 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1752 title = {Topological entropy},
1753 journal = {Transactions of the American Mathematical Society},
1758 timestamp = {2008.05.29}
1762 author = {Rufus Bowen},
1763 title = {Entropy for group endomorphisms and homogeneous spaces},
1764 journal = {Transactions of the American Mathematical Society},
1769 timestamp = {15/02/2008}
1772 @article{10.1109/CIMSiM.2010.36,
1773 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1774 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1775 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1779 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1780 publisher = {IEEE Computer Society},
1781 address = {Los Alamitos, CA, USA},
1783 @article{10.1109/ICME.2003.1221665,
1784 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1785 title = {Neural network based steganalysis in still images},
1786 journal ={Multimedia and Expo, IEEE International Conference on},
1790 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1791 publisher = {IEEE Computer Society},
1792 address = {Los Alamitos, CA, USA},
1795 @ARTICLE{Sullivan06steganalysisfor,
1796 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1797 title = {Steganalysis for Markov cover data with applications to images},
1798 journal = {IEEE Transactions on Information Forensics and Security},
1807 author = "Gray, Frank",
1808 title = "Pulse code communication",
1809 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1814 @INPROCEEDINGS{guyeux10ter,
1815 author = {Bahi, Jacques M. and Guyeux, Christophe},
1816 title = {A new chaos-based watermarking algorithm},
1817 booktitle = {SECRYPT'10, International Conference on Security
1821 address = {Athens, Greece},
1823 publisher = {SciTePress},
1824 classement = {ACTI},
1825 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1831 @inproceedings{Qiao:2009:SM:1704555.1704664,
1832 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1833 title = {Steganalysis of MP3Stego},
1834 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1835 series = {IJCNN'09},
1837 location = {Atlanta, Georgia, USA},
1838 pages = {2723--2728},
1840 publisher = {IEEE Press}
1843 @inproceedings{CouchotD07IFM,
1845 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1848 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1849 title = {Guiding the Correction of Parameterized Specifications},
1850 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1854 publisher = {Springer},
1855 doi = {10.1007/978-3-540-73210-5_10},
1856 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1857 address = {Oxford, UK},
1863 @inproceedings{couchot07FTP,
1867 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1868 title = {A Graph-based Strategy for the Selection of Hypotheses},
1869 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1870 address = {Liverpool, UK},
1877 @inproceedings{cgs09:ip,
1879 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1881 classement = {ACTI},
1882 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1883 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1884 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1885 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1886 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1887 publisher = {ACM Press},
1889 url = {http://arxiv.org/abs/0907.1357},
1890 otherUrl = {http://hal.inria.fr/inria-00402204},
1891 address = {Grenoble, France},
1892 editor = {Hassen Sa\"{i}di and N. Shankar},
1899 @inproceedings{couchot07cade,
1903 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1904 title = {Handling Polymorphism in Automated Deduction},
1905 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1909 publisher = {Springer},
1910 isbn = {978-3-540-73594-6},
1911 doi = {10.1007/978-3-540-73595-3_18},
1912 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1913 address = {Bremen, Germany},
1925 @inproceedings{BCDG07,
1927 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1928 equipe = {vesontio},
1929 classement = {ACTI},
1930 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1931 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1932 booktitle = {B'2007, the 7th Int. B Conference},
1936 publisher = {Springer},
1937 doi = {10.1007/11955757_10},
1938 url = {http://dx.doi.org/10.1007/11955757_10},
1939 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1940 address = {Besancon, France},
1948 @article{byrd1995limited,
1949 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1950 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1951 journal = {SIAM J. Sci. Comput.},
1952 issue_date = {Sept. 1995},
1958 pages = {1190--1208},
1960 url = {http://dx.doi.org/10.1137/0916069},
1961 doi = {10.1137/0916069},
1963 publisher = {Society for Industrial and Applied Mathematics},
1964 address = {Philadelphia, PA, USA},
1965 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1968 @article{ANU:1770520,
1969 author = {Powell,M. J. D.},
1970 title = {Direct search algorithms for optimization calculations},
1971 journal = {Acta Numerica},
1978 doi = {10.1017/S0962492900002841},
1979 URL = {http://journals.cambridge.org/article_S0962492900002841},
1985 journal={The Journal of Supercomputing},
1988 doi={10.1007/s11227-010-0500-5},
1989 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1990 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1991 publisher={Springer US},
1992 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1993 author={Wang, Honggang},
1999 author={Yifeng He and Lee, I. and Ling Guan},
2000 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
2001 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
2006 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
2007 doi={10.1109/TCSVT.2009.2017411},
2011 author={Palomar, D.P. and Mung Chiang},
2012 journal={Selected Areas in Communications, IEEE Journal on},
2013 title={A tutorial on decomposition methods for network utility maximization},
2018 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
2019 doi={10.1109/JSAC.2006.879350},
2024 journal={EURASIP Journal on Information Security},
2028 doi={10.1186/1687-417X-2014-1},
2029 title={Universal distortion function for steganography in an arbitrary domain},
2030 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
2031 publisher={Springer International Publishing},
2032 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
2040 @inproceedings{conf/wifs/HolubF12,
2041 added-at = {2013-01-23T00:00:00.000+0100},
2042 author = {Holub, Vojtech and Fridrich, Jessica J.},
2043 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
2045 crossref = {conf/wifs/2012},
2046 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
2047 interhash = {cbef658a6868216eef585dd759ae0668},
2048 intrahash = {a685b4b8b521ac99734fb52c064ca994},
2049 isbn = {978-1-4673-2285-0},
2053 timestamp = {2013-01-23T00:00:00.000+0100},
2054 title = {Designing steganographic distortion using directional filters.},
2055 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
2059 @proceedings{conf/wifs/2012,
2060 title = {2012 {IEEE} International Workshop on Information Forensics and Security,
2061 {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
2062 publisher = {{IEEE}},
2064 url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
2065 isbn = {978-1-4673-2285-0},
2066 timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
2067 biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
2068 bibsource = {dblp computer science bibliography, http://dblp.org}
2072 @article{FillerJF11,
2073 author = {Tom{\'a}s Filler and
2075 Jessica J. Fridrich},
2076 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
2078 journal = {IEEE Transactions on Information Forensics and Security},
2083 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2084 bibsource = {DBLP, http://dblp.uni-trier.de}
2087 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2088 editor = {Ira S. Moskowitz},
2089 author = {Shelby Pereira and
2090 Sviatoslav Voloshynovskiy and
2092 St{\'e}phane Marchand-Maillet and
2094 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
2095 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
2096 title = {Second Generation Benchmarking and Application Oriented
2101 publisher = springer,
2102 address = springer_loc,
2108 @inproceedings{DBLP:conf/ih/Westfeld01,
2109 added-at = {2011-06-28T00:00:00.000+0200},
2110 author = {Westfeld, Andreas},
2111 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
2112 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
2113 editor = {Ira S. Moskowitz},
2115 publisher = springer,
2116 address = springer_loc,
2119 title = {F5-A Steganographic Algorithm.},
2128 @article{Chang20101286,
2129 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
2130 journal = "Digital Signal Processing",
2133 pages = "1286 - 1307",
2137 doi = "10.1016/j.dsp.2009.11.005",
2138 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
2139 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
2140 keywords = "Security",
2141 keywords = "Wet paper coding",
2142 keywords = "Steganography",
2143 keywords = "Indicator",
2144 keywords = "Fuzzy edge detector"
2149 @article{Hu:2007:HPE:1282866.1282944,
2150 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
2151 title = {A high performance edge detector based on fuzzy inference rules},
2152 journal = {Inf. Sci.},
2153 issue_date = {November, 2007},
2159 pages = {4768--4784},
2161 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
2162 doi = {10.1016/j.ins.2007.04.001},
2164 publisher = {Elsevier Science Inc.},
2165 address = {New York, NY, USA},
2166 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
2170 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
2171 author = {Sorina Dumitrescu and
2173 editor = {Ahmet M. Eskicioglu and
2174 Jessica J. Fridrich and
2176 title = {LSB steganalysis based on high-order statistics},
2177 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
2178 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
2181 address = {New York, NY, USA},
2184 ee = {http://doi.acm.org/10.1145/1073170.1073176},
2185 bibsource = {DBLP, http://dblp.uni-trier.de}
2188 @inproceedings{DBLP:conf/ih/Ker05,
2189 author = {Andrew D. Ker},
2190 title = {A General Framework for Structural Steganalysis of LSB Replacement},
2191 editor = {Mauro Barni and
2192 Jordi Herrera-Joancomart\'{\i} and
2193 Stefan Katzenbeisser and
2194 Fernando P{\'e}rez-Gonz{\'a}lez},
2195 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
2196 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
2199 ee = {http://dx.doi.org/10.1007/11558859_22},
2200 publisher = springer,
2201 address = springer_loc,
2208 @inproceedings{FK12,
2209 editor = {Matthias Kirchner and
2211 booktitle = {Information Hiding - 14th International Conference, IH 2012,
2212 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
2213 author = {Jessica J. Fridrich and
2215 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
2219 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
2221 publisher = springer,
2222 address = springer_loc,
2224 bibsource = {DBLP, http://dblp.uni-trier.de}
2228 @article{DBLP:journals/tsp/DumitrescuWW03,
2229 added-at = {2012-02-06T00:00:00.000+0100},
2230 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
2231 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
2232 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
2233 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
2234 intrahash = {556caad9b61980d3458885153a52321c},
2235 journal = {IEEE Transactions on Signal Processing},
2238 pages = {1995-2007},
2239 timestamp = {2012-02-06T00:00:00.000+0100},
2240 title = {Detection of LSB steganography via sample pair analysis.},
2241 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
2249 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
2250 editor = {Nicolas D. Georganas and
2251 Radu Popescu-Zeletin},
2252 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
2253 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
2255 author = {Jessica J. Fridrich and
2258 title = {Reliable detection of LSB steganography in color and grayscale
2262 ee = {http://doi.acm.org/10.1145/1232454.1232466},
2264 address = {New York, NY, USA},
2266 bibsource = {DBLP, http://dblp.uni-trier.de}
2273 @inproceedings{DBLP:conf/ih/PevnyFB10,
2274 author = {Tom{\'a}s Pevn{\'y} and
2275 Tom{\'a}s Filler and
2277 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
2279 editor = {Rainer B{\"o}hme and
2280 Philip W. L. Fong and
2281 Reihaneh Safavi-Naini},
2282 booktitle = {Information Hiding - 12th International Conference, IH 2010,
2283 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2288 publisher = springer,
2289 address = springer_loc,
2292 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
2293 bibsource = {DBLP, http://dblp.uni-trier.de}
2302 author = {Tom{\'a}s Pevn{\'y} and
2303 Tom{\'a}s Filler and
2306 title = {Break Our Steganographic System},
2307 OPThowpublished = {},
2310 note = {Available at \url{http://www.agents.cz/boss/}},
2314 @proceedings{DBLP:conf/ih/2010,
2315 editor = {Rainer B{\"o}hme and
2316 Philip W. L. Fong and
2317 Reihaneh Safavi-Naini},
2318 title = {Information Hiding - 12th International Conference, IH 2010,
2319 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
2321 booktitle = {Information Hiding},
2322 publisher = springer,
2323 address = springer_loc,
2327 isbn = {978-3-642-16434-7},
2328 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
2329 bibsource = {DBLP, http://dblp.uni-trier.de}
2333 @article{DBLP:journals/eswa/ChenCL10,
2334 added-at = {2010-07-21T15:44:10.000+0200},
2335 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
2336 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
2337 date = {2010-05-03},
2338 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
2339 interhash = {bc34a5f04661fee24ee62c39e76361be},
2340 intrahash = {28889a4ab329da28559f0910469f054b},
2341 journal = {Expert Systems with Applications},
2344 pages = {3292-3301},
2345 timestamp = {2010-07-21T15:44:10.000+0200},
2346 title = {High payload steganography mechanism using hybrid edge detector.},
2347 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
2352 @article{DBLP:journals/tifs/FillerJF11,
2353 added-at = {2011-09-29T00:00:00.000+0200},
2354 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
2355 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
2356 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
2357 interhash = {b27d23ed0c9936d568e16c51378abccd},
2358 intrahash = {50e43c05a74eec17524b3df8db442da5},
2359 journal = {IEEE Transactions on Information Forensics and Security},
2363 timestamp = {2011-09-29T00:00:00.000+0200},
2364 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
2365 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
2373 @inproceedings{DBLP:conf/ih/KimDR06,
2374 added-at = {2007-09-20T00:00:00.000+0200},
2375 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
2376 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
2377 booktitle = {Information Hiding},
2378 crossref = {DBLP:conf/ih/2006},
2379 date = {2007-09-20},
2380 description = {dblp},
2381 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
2382 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
2383 interhash = {399aab122b39cfd6f6e951a1b276c786},
2384 intrahash = {f0324f70d62d9dfba568e393920aaa16},
2385 isbn = {978-3-540-74123-7},
2389 publisher = springer,
2390 address = springer_loc,
2392 timestamp = {2007-09-20T00:00:00.000+0200},
2393 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
2394 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
2400 @proceedings{DBLP:conf/ih/2006,
2401 editor = {Jan Camenisch and
2402 Christian S. Collberg and
2405 title = {Information Hiding, 8th International Workshop, IH 2006,
2406 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
2407 booktitle = {Information Hiding},
2408 publisher = springer,
2409 address = springer_loc,
2413 isbn = {978-3-540-74123-7},
2414 bibsource = {DBLP, http://dblp.uni-trier.de}
2419 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
2420 author = {Jessica J. Fridrich and
2421 Tom{\'a}s Pevn{\'y} and
2423 title = {Statistically undetectable jpeg steganography: dead ends
2424 challenges, and opportunities},
2426 ee = {http://doi.acm.org/10.1145/1288869.1288872},
2427 editor = {Deepa Kundur and
2428 Balakrishnan Prabhakaran and
2430 Jessica J. Fridrich},
2431 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
2432 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
2434 address = {New York, NY, USA},
2437 isbn = {978-1-59593-857-2},
2438 bibsource = {DBLP, http://dblp.uni-trier.de}
2444 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
2445 editor = {Nasir D. Memon and
2447 Adnan M. Alattar and
2449 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2450 Electronic Imaging Symposium, San Jose, CA, USA, January
2451 18-20, 2010, Proceedings},
2452 author = {Tom{\'a}s Filler and
2454 Jessica J. Fridrich},
2455 title = {Minimizing embedding impact in steganography using trellis-coded
2459 ee = {http://dx.doi.org/10.1117/12.838002},
2460 bibsource = {DBLP, http://dblp.uni-trier.de},
2464 series = {SPIE Proceedings},
2475 @proceedings{DBLP:conf/mediaforensics/2010,
2476 editor = {Nasir D. Memon and
2478 Adnan M. Alattar and
2480 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
2481 Electronic Imaging Symposium, San Jose, CA, USA, January
2482 18-20, 2010, Proceedings},
2483 booktitle = {Media Forensics and Security},
2486 series = {SPIE Proceedings},
2489 isbn = {978-0-8194-7934-1},
2490 bibsource = {DBLP, http://dblp.uni-trier.de}
2493 @article{DBLP:journals/corr/abs-1112-5239,
2494 author = {Jacques M. Bahi and
2495 Rapha{\"e}l Couturier and
2496 Christophe Guyeux and
2497 Pierre-Cyrille H{\'e}am},
2498 title = {Efficient and Cryptographically Secure Generation of Chaotic
2499 Pseudorandom Numbers on GPU},
2501 volume = {abs/1112.5239},
2503 ee = {http://arxiv.org/abs/1112.5239},
2504 bibsource = {DBLP, http://dblp.uni-trier.de}
2508 author = {Ponomarenko, Nikolay},
2509 title = {PSNR-HVS-M page},
2510 OPThowpublished = {},
2513 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2519 author = {Bovik, Alan C.},
2520 title = {BIQI page},
2521 OPThowpublished = {},
2524 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2529 @InProceedings{PSECAL07,
2530 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2531 title = {On between-coefficient contrast masking of DCT basis functions},
2532 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2535 editor = {Li,Baoxin},
2541 OPTorganization = {},
2549 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2550 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2551 journal = {IEEE Signal Processing Letters},
2562 @inproceedings{DBLP:conf/crypto/ShubBB82,
2563 author = {Lenore Blum and
2566 title = {Comparison of Two Pseudo-Random Number Generators},
2567 editor = {David Chaum and
2568 Ronald L. Rivest and
2570 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2571 Barbara, California, USA, August 23-25, 1982},
2573 bibsource = {DBLP, http://dblp.uni-trier.de},
2574 publisher = {Plenum Press},
2575 address={New York, NY, USA},
2578 bibsource = {DBLP, http://dblp.uni-trier.de}
2582 @inproceedings{Blum:1985:EPP:19478.19501,
2583 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2584 Barbara, California, USA, August 19-22, 1984, Proceedings},
2585 author = {Manuel Blum and
2587 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2588 Which Hides All Partial Information},
2592 editor = {G. R. Blakley and
2594 publisher = springer,
2595 address = springer_loc,
2602 @article{DBLP:journals/ejisec/FontaineG07,
2603 author = {Caroline Fontaine and
2605 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2606 journal = {EURASIP Journal on Information Security},
2611 ee = {http://dx.doi.org/10.1155/2007/13801},
2612 bibsource = {DBLP, http://dblp.uni-trier.de}
2616 @article{Luo:2010:EAI:1824719.1824720,
2617 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2618 title = {Edge adaptive image steganography based on LSB matching revisited},
2619 journal = {IEEE Transactions on Information Forensics and Security},
2627 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2628 doi = {10.1109/TIFS.2010.2041812},
2630 publisher = {IEEE Press},
2631 address = {Piscataway, NJ, USA},
2632 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2635 @article{Mielikainen06,
2636 author = {Mielikainen, J.},
2637 title = {LSB Matching Revisited},
2638 journal = {IEEE Signal Processing Letters},
2653 @article{Liu:2008:FMP:1284917.1285196,
2654 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2655 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2656 journal = {Pattern Recogn.},
2657 issue_date = {January, 2008},
2665 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2666 doi = {10.1016/j.patcog.2007.06.005},
2668 publisher = {Elsevier Science Inc.},
2669 address = {New York, NY, USA},
2670 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2675 @InProceedings{LHS08,
2676 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2677 title = {Textural features based universal steganalysis},
2680 booktitle = {Proc. SPIE 6819},
2691 OPTorganization = {},
2698 @InProceedings{KF11,
2699 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2700 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2703 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2707 pages = {78800L-78800L-13},
2716 OPTorganization = {},
2722 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
2723 author = {Jan Kodovský and
2725 Jessica J. Fridrich},
2726 title = {Modern steganalysis can detect YASS.},
2727 booktitle = {Media Forensics and Security},
2730 ee = {http://dx.doi.org/10.1117/12.838768}
2733 @article{DBLP:journals/tifs/KodovskyFH12,
2734 author = {Jan Kodovsk{\'y} and
2735 Jessica J. Fridrich and
2737 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2738 journal = {IEEE Transactions on Information Forensics and Security},
2743 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2744 bibsource = {DBLP, http://dblp.uni-trier.de}
2749 @article{Fillatre:2012:ASL:2333143.2333587,
2750 author = {Fillatre, Lionel},
2751 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2752 journal = {IEEE Transactions on Signal Processing},
2760 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2761 doi = {10.1109/TSP.2011.2174231},
2763 publisher = {IEEE Press},
2764 address = {Piscataway, NJ, USA},
2768 @inproceedings{Tyan1993,
2769 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2770 address = ieecs_loc,
2772 author = {Tyan, C. Y. and Wang, P. P.},
2773 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2774 citeulike-article-id = {7936501},
2775 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2777 posted-at = {2010-10-01 17:27:48},
2780 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2786 @article{Canny:1986:CAE:11274.11275,
2787 author = {Canny, J},
2788 title = {A Computational Approach to Edge Detection},
2789 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2790 issue_date = {June 1986},
2798 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2799 doi = {10.1109/TPAMI.1986.4767851},
2801 publisher = {IEEE Computer Society},
2802 address = {Washington, DC, USA},
2803 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2807 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2808 author = {Jessica J. Fridrich and
2809 Jan Kodovsk{\'y} and
2812 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2814 booktitle = {Information Hiding},
2817 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2818 crossref = {DBLP:conf/ih/2011},
2819 bibsource = {DBLP, http://dblp.uni-trier.de}
2821 @proceedings{DBLP:conf/ih/2011,
2822 editor = {Tom{\'a}s Filler and
2823 Tom{\'a}s Pevn{\'y} and
2826 title = {Information Hiding - 13th International Conference, IH 2011,
2827 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2829 booktitle = {Information Hiding},
2830 publisher = springer,
2831 address = springer_loc,
2835 isbn = {978-3-642-24177-2},
2836 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2837 bibsource = {DBLP, http://dblp.uni-trier.de}
2840 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2841 author = {Jessica J. Fridrich},
2842 title = {Modern Trends in Steganography and Steganalysis},
2846 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2847 crossref = {DBLP:conf/iwdw/2011},
2848 bibsource = {DBLP, http://dblp.uni-trier.de}
2850 @proceedings{DBLP:conf/iwdw/2011,
2851 editor = {Yun-Qing Shi and
2852 Hyoung-Joong Kim and
2853 Fernando P{\'e}rez-Gonz{\'a}lez},
2854 title = {Digital Forensics and Watermarking - 10th International
2855 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2856 2011, Revised Selected Papers},
2858 publisher = springer,
2859 address = springer_loc,
2863 isbn = {978-3-642-32204-4},
2864 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2865 bibsource = {DBLP, http://dblp.uni-trier.de}
2872 @InProceedings{kcm16:ip,
2873 author = {N. Khernane, J.-F. Couchot, A. Mostefaoui},
2874 title = {Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints},
2877 booktitle = {MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access},
2886 OPTorganization = {},
2892 @article{MCErlang07,
2893 author = {Fredlund, Lars-Ake and Svensson, Hans},
2894 title = {McErlang: a model checker for a distributed functional programming language},
2895 journal = {SIGPLAN Not.},
2904 @inproceedings{Bogor03,
2906 Matthew B. Dwyer and
2908 title = {Bogor: an extensible and highly-modular software model checking
2910 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2911 of Software Engineering 2003},
2919 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2920 title = {On Devaney's Definition of Chaos},
2921 journal = {Amer. Math. Monthly},
2927 timestamp = {27/01/2008}
2930 @article{Crook2007267,
2931 title = "Pattern recall in networks of chaotic neurons",
2932 journal = "Biosystems",
2935 pages = "267 - 274",
2938 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2939 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2941 keywords = "Spiking neural network"
2945 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2946 title = {A novel Hash algorithm construction based on chaotic neural network},
2947 journal = {Neural Computing and Applications},
2950 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2953 keyword = {Computer Science},
2954 publisher = {Springer London}
2958 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2959 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2965 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2966 doi={10.1109/TCE.2004.1309431},
2969 @article{Zhang2005759,
2970 title = "An image encryption approach based on chaotic maps",
2971 journal = "Chaos, Solitons \& Fractals",
2974 pages = "759 - 765",
2978 doi = "10.1016/j.chaos.2004.09.035",
2979 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2982 @article{Lian20091296,
2983 title = "A block cipher based on chaotic neural networks",
2984 journal = "Neurocomputing",
2987 pages = "1296 - 1301",
2990 author = "Shiguo Lian",
2991 keywords = "Neural network",
2993 keywords = "Security",
2994 keywords = "Block cipher",
2995 keywords = "Image encryption"
2999 author = {George Cybenko},
3000 title = {Approximation by Superpositions of a Sigmoidal function},
3001 journal = {Mathematics of Control, Signals and Systems},
3008 @article{DBLP:journals/nn/HornikSW89,
3009 author = {Kurt Hornik and
3010 Maxwell B. Stinchcombe and
3012 title = {Multilayer feedforward networks are universal approximators},
3013 journal = {Neural Networks},
3018 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
3019 bibsource = {DBLP, http://dblp.uni-trier.de}
3022 @article{dalkiran10,
3023 author = {Ilker Dalkiran and Kenan Danisman},
3024 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
3025 title = {Artificial neural network based chaotic generator for cryptology},
3033 @article{springerlink:10.1007/s00521-010-0432-2,
3034 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
3035 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
3036 title = {A novel Hash algorithm construction based on chaotic neural network},
3037 journal = {Neural Computing and Applications},
3038 publisher = {Springer},
3040 keyword = {Computer Science},
3046 @article{Feder2009NTB,
3047 author = {Feder, Tom\'{a}s and Subi, Carlos},
3048 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
3049 journal = {Inf. Process. Lett.},
3050 issue_date = {February, 2009},
3058 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
3059 doi = {10.1016/j.ipl.2008.10.015},
3061 publisher = {Elsevier North-Holland, Inc.},
3062 address = {Amsterdam, The Netherlands, The Netherlands},
3063 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
3069 author={Zanten, A.~J.~van and Suparta, I.~N.},
3070 title={ Totally balanced and exponentially balanced Gray codes},
3071 journal={Discrete Analysis and Operational Research},
3079 @book{LevinPeresWilmer2006,
3080 added-at = {2010-01-19T17:51:27.000+0100},
3081 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
3082 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
3083 interhash = {61354795a6accb6407bfdbf04753a683},
3084 intrahash = {097dc4d1d0e412b2444f540b04110797},
3085 keywords = {markovchains probabilitytheory textbook},
3086 publisher = {American Mathematical Society},
3087 timestamp = {2010-01-19T17:51:27.000+0100},
3088 title = {{Markov chains and mixing times}},
3089 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
3094 author = {M. Mitzenmacher and Eli Upfal},
3096 title = {Probability and Computing},
3097 publisher = {Cambridge University Press},
3103 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3106 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
3107 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
3108 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
3114 @article{Robinson:1981:CS,
3115 author = {Robinson, John P. and Cohn, Martin},
3116 title = {Counting Sequences},
3117 journal = {IEEE Trans. Comput.},
3118 issue_date = {January 1981},
3126 url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
3128 publisher = {IEEE Computer Society},
3129 address = {Washington, DC, USA},
3130 keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
3132 @article{DBLP:journals/combinatorics/BhatS96,
3133 author = {Girish S. Bhat and
3135 title = {Balanced Gray Codes},
3136 journal = {Electr. J. Comb.},
3140 url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
3141 timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
3142 biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
3143 bibsource = {dblp computer science bibliography, http://dblp.org}
3148 @inproceedings{DBLP:conf/secrypt/MohammedCG16,
3149 author = {Bakiri Mohammed and
3150 Jean{-}Fran{\c{c}}ois Couchot and
3152 title = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators
3153 based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study},
3154 booktitle = {Proceedings of the 13th International Joint Conference on e-Business
3155 and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
3156 Portugal, July 26-28, 2016.},
3159 crossref = {DBLP:conf/secrypt/2016},
3160 url = {http://dx.doi.org/10.5220/0005967903020309},
3161 doi = {10.5220/0005967903020309},
3162 timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
3163 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/MohammedCG16},
3164 bibsource = {dblp computer science bibliography, http://dblp.org}
3167 @proceedings{DBLP:conf/secrypt/2016,
3168 editor = {Christian Callegari and
3169 Marten van Sinderen and
3170 Panagiotis G. Sarigiannidis and
3171 Pierangela Samarati and
3174 Mohammad S. Obaidat},
3175 title = {Proceedings of the 13th International Joint Conference on e-Business
3176 and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
3177 Portugal, July 26-28, 2016},
3178 publisher = {SciTePress},
3180 isbn = {978-989-758-196-0},
3181 timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
3182 biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2016},
3183 bibsource = {dblp computer science bibliography, http://dblp.org}
3187 author = {Couchot, Jean-Fran\c{c}ois and Contassot-Vivier, Sylvain and
3188 H\'eam, Pierre-Cyrille and Guyeux, Christophe},
3189 title = {Random Walk in a N-cube Without Hamiltonian Cycle
3190 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
3192 journal = {International Journal of Bifurcation and Chaos},
3193 note={Accepted on Oct 2016},
3198 @article{Khan2014251,
3199 title = "A recent survey of reversible watermarking techniques ",
3200 journal = "Information Sciences ",
3203 pages = "251 - 272",
3207 doi = "http://dx.doi.org/10.1016/j.ins.2014.03.118",
3208 url = "http://www.sciencedirect.com/science/article/pii/S0020025514004150",
3209 author = "Asifullah Khan and Ayesha Siddiqa and Summuyya Munib and Sana Ambreen Malik",
3210 keywords = "Information hiding",
3211 keywords = "Histogram processing",
3212 keywords = "Reversible watermarking",
3213 keywords = "Error expansion",
3214 keywords = "Quantization",
3215 keywords = "Prediction error ",
3216 abstract = "Abstract The art of secretly hiding and communicating information has gained immense importance in the last two decades due to the advances in generation, storage, and communication technology of digital content. Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, watermarking can cause damage to the sensitive information present in the cover work. Therefore, at the receiving end, the exact recovery of cover work may not be possible. Additionally, there exist certain applications that may not tolerate even small distortions in cover work prior to the downstream processing. In such applications, reversible watermarking instead of conventional watermarking is employed. Reversible watermarking of digital content allows full extraction of the watermark along with the complete restoration of the cover work. For the last few years, reversible watermarking techniques are gaining popularity because of its increasing applications in some important and sensitive areas, i.e., military communication, healthcare, and law-enforcement. Due to the rapid evolution of reversible watermarking techniques, a latest review of recent research in this field is highly desirable. In this survey, the performances of different reversible watermarking schemes are discussed on the basis of various characteristics of watermarking. However, the major focus of this survey is on prediction-error expansion based reversible watermarking techniques, whereby the secret information is hidden in the prediction domain through error expansion. Comparison of the different reversible watermarking techniques is provided in tabular form, and an analysis is carried out. Additionally, experimental comparison of some of the recent reversible watermarking techniques, both in terms of watermarking properties and computational time, is provided on a dataset of 300 images. Future directions are also provided for this potentially important field of watermarking. "