1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
6 @inproceedings{couchot04:onp,
8 author = {Couchot, Jean-Fran\c{c}ois},
9 title = {V\'erification d'invariant par superposition},
10 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
11 address = {Calais, France},
12 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
13 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
14 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
15 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
24 @inproceedings{aangc+15:ip,
26 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
29 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
30 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
31 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
33 doi = {10.1007/978-3-319-16483-0_38},
34 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
37 address = {Granada, Spain},
49 @inproceedings{agcs+15:ip,
51 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
54 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
55 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
56 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
57 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
61 publisher = {Springer},
62 address = {Mexico City, Mexico},
66 note = {To appear in the LNCS/LNBI series},
72 @inproceedings{bcg11:ip,
74 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
77 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
78 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
79 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
81 address = {Luxembourg, Luxembourg},
84 note = {Best paper award},
90 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
95 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
96 title = {Quality analysis of a chaotic proven keyed hash function},
97 journal = {International Journal On Advances in Internet Technology},
109 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
114 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
115 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
116 journal = {Annals of Telecommunications},
117 doi = {10.1007/s12243-015-0466-7},
118 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
119 publisher = {Springer},
121 note = {Available online. Paper version to appear},
125 @inproceedings{fccg15:ip,
127 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
130 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
131 title = {Steganalyzer performances in operational contexts},
132 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
134 address = {Adelaide, Australia},
142 @inproceedings{bcfg12a:ip,
144 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
147 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
148 title = {Application of Steganography for Anonymity through the Internet},
149 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
151 url = {http://arxiv.org/abs/1202.5302v1},
152 address = {Venice, Italy},
159 @inproceedings{bcfg+13:ip,
161 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
164 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
165 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
166 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
168 doi = {10.1109/IIH-MSP.2013.141},
169 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
170 address = {Beijing, China},
176 @inproceedings{bcfg12b:ip,
178 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
181 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
182 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
183 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
185 address = {Venice, Italy},
195 @inproceedings{bcg11b:ip,
197 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
200 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
201 title = {Steganography: a Class of Algorithms having Secure Properties},
202 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
204 address = {Dalian, China},
213 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
216 impact-factor ={1.363},
217 isi-acro = {COMPUT J},
218 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
219 title = {Steganography: a class of secure and robust algorithms},
220 journal = {The Computer Journal},
224 doi = {10.1093/comjnl/bxr116},
225 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
226 publisher = {Oxford University Press},
232 @inproceedings{bcgw11:ip,
234 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
237 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
238 title = {Class of Trustworthy Pseudo Random Number Generators},
239 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
241 address = {Luxembourg, Luxembourg},
249 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
252 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
253 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
254 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
260 @inproceedings{aagp+15:ip,
262 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
264 classement = {ACTIN},
265 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
266 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
267 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
269 address = {Naples, Italy},
277 @inproceedings{acgm+14:ij,
279 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
282 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
283 title = {Finding the Core-Genes of Chloroplasts},
284 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
286 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
288 doi = {10.7763/IJBBB.2014.V4.371},
289 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
290 address = {Copenhagen, Denmark},
300 @inproceedings{akgcs+14:oip,
302 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
305 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
306 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
307 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
308 address = {Belfast, United Kingdom},
312 note = {Short paper},
317 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
320 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
321 title = {Finding the core-genes of Chloroplast Species},
322 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
332 @PhdThesis{guyeuxphd,
333 author = {Guyeux, Christophe},
334 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
335 type = {Th\`ese de {D}octorat},
336 school = {LIFC, Universit\'e de Franche-Comt\'e},
338 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
339 month = {13 décembre},
344 @inproceedings{chgw+14:oip,
346 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
348 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
349 title = {Pseudorandom Number Generators with Balanced Gray Codes},
350 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
352 address = {Vienna, Austria},
361 @INPROCEEDINGS{nusmv02,
362 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
363 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
364 Sebastiani and Armando Tacchella},
365 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
369 crossref = {DBLP:conf/cav/2002}
373 author = {Nishanth Chandrasekaran},
374 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
379 Author = "Gastin, P. and Oddoux, D.",
380 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
381 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
382 Publisher = "Springer",
389 @inproceedings{cg04:np,
391 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
392 title = {Analyse d'atteignabilit\'e d\'eductive},
393 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
395 editor = {Julliand, Jacques},
396 address = {Besan\c{c}on, France},
405 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
406 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
407 journal = {Journal of the Brazilian Computer Society (JBCS)},
411 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
414 note = {ISSN 0104-6500},
419 @inproceedings{cddg+04:ip,
421 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
423 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
424 title = {Proving and Debugging Set-Based Specifications},
425 booktitle = {WMF'03 proceedings},
426 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
429 editor = {A. Cavalcanti and P. Machado},
430 address = {Campina Grande, Brazil},
431 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
438 @inproceedings{cdgr04:onp,
440 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
441 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
443 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
444 address = {Besan\c{c}on, France},
447 editor = {Julliand, Jacques},
448 note = {Session outils},
453 @INPROCEEDINGS{CGK05,
454 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
455 title = {A uniform deductive approach for parameterized protocol safety},
459 bibsource = {DBLP, http://dblp.uni-trier.de},
460 crossref = {DBLP:conf/kbse/2005},
461 ee = {http://doi.acm.org/10.1145/1101908.1101971}
464 @INPROCEEDINGS{abcvs05,
465 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
466 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
468 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
472 address = {Guelph, Canada},
474 note = {ISSN 1492-8760}
478 author = {Bahi, J. M.},
479 title = {Boolean totally asynchronous iterations},
487 author = {Bahi, J. M. and Contassot-Vivier, S.},
488 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
498 author = {Bahi, J. M. and Contassot-Vivier, S.},
499 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
504 pages = {1353--1363},
509 @inproceedings{bcgr11:ip,
511 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
514 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
515 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
516 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
520 doi = {10.1007/978-3-642-22953-4_11},
521 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
522 address = {Oslo, Norway},
530 @techreport{BCVC10:ir,
531 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
532 title = {Convergence Results of Combining Synchronism and Asynchronism for
533 Discrete-State Discrete-Time Dynamic Network},
535 institution = {LIFC - Laboratoire d’{I}nformatique de
536 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
537 type = {Research Report},
538 number = {RR2010-02},
539 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
543 @techreport{Cou10:ir,
544 author = {Couchot, J.-F.},
545 title = {Formal {C}onvergence {P}roof for {D}iscrete
546 {D}ynamical {S}ystems},
547 institution = {LIFC - Laboratoire d’{I}nformatique de
548 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
549 type = {Research Report},
550 number = {RR2010-03},
551 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
559 author = {Bahi, J. M. and Michel, C.},
560 title = {Convergence of discrete asynchronous iterations},
561 journal = {International Journal Computer Mathematics},
568 author = {Bahi, J. M. and Michel, C.},
569 title = {Simulations of asynchronous evolution of discrete systems},
570 journal = {Simulation Practice and Theory},
578 author = {G\'{e}rard M. Baudet},
579 title = {Asynchronous Iterative Methods for Multiprocessors},
585 doi = {http://doi.acm.org/10.1145/322063.322067},
591 title = {Parallel and distributed computation: numerical methods},
592 publisher = prenticeHall,
594 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
595 isbn = {0-13-648700-9}
599 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
600 title = {The software model checker Blast},
608 @INPROCEEDINGS{LeCun85,
610 title = {A learning scheme for threshold networks},
611 booktitle = {Cognitiva'95},
614 address = {Paris, France}
618 author = {Jeffrey L. Elman},
619 title = {Finding Structure in Time},
620 journal = {Cognitive Science},
627 author = {Andreas Frommer and Daniel B. Szyld},
628 title = {On asynchronous iterations},
634 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
640 author = {Goles Ch., E. and Salinas,L.},
641 title = {Comparison between parallel and serial dynamics of Boolean networks},
650 title = {The SPIN Model Checker: Primer and Reference Manual},
651 publisher = {Addison-Wesley, Pearson Education},
653 author = {Gerard J. Holzmann}
657 author = {Shih M.-H. and Ho, J.-L.},
658 title = {Solution of the Boolean Markus-Yamabe Problem},
659 journal = advapplMath,
667 author = {Adrien Richard},
668 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
670 journal = advapplMath,
679 author = {Adrien Richard and Jean-Paul Comet},
680 title = {Necessary conditions for multistationarity in discrete dynamical
682 journal = discreteapplMath,
685 pages = {2403--2413},
692 title = {Les syst\`emes dynamiques discrets},
693 publisher = springer,
695 author = {F. Robert},
697 series = {Math\'ematiques et Applications}
701 author = {Shih, M.-H. and Dong J.-L.},
702 title = {A combinatorial analogue of the Jacobian problem in automata networks},
703 journal = advapplMath,
712 author = {Thomas, R.},
713 title = {Boolean Formalization of Genetic Control Circuits},
721 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
722 title = {Absence of Cycles in Symmetric Neural Networks},
728 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
731 @PROCEEDINGS{DBLP:conf/cav/2002,
732 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
733 Denmark, July 27-31, 2002, Proceedings},
735 editor = {Ed Brinksma and Kim Guldstrand Larsen},
738 publisher = springer,
742 @PROCEEDINGS{DBLP:conf/kbse/2005,
743 title = {20th IEEE/ACM International Conference on Automated Software Engineering
744 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
746 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
748 bibsource = {DBLP, http://dblp.uni-trier.de},
753 author = {Ben-Ari, Mordechai},
755 title = {Principles of the Spin Model Checker},
756 isbn = {1846287693, 9781846287695}},
757 publisher = springer,
761 @INPROCEEDINGS{Wei97,
762 author = {Weise,Carsten},
763 title = {An incremental formal semantics for {PROMELA}},
764 booktitle = {SPIN97, the Third SPIN Workshop},
769 @PHDTHESIS{Couchot-PhD06,
770 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
771 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
774 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
775 TYPE = {Th\`ese de {D}octorat},
780 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
781 Page, M. and Tewfik, S. and Geiselmann, J.},
782 title = {Qualitative simulation of genetic regulatory networks
783 using piecewise-linear models},
784 journal = {Bull. Math. Biol.},
796 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
797 title = {A Fruitful Application of Formal Methods to Biological
798 Regulatory Networks: Extending {T}homas' Asynchronous
799 Logical Approach with Temporal Logic},
800 journal = {J. Theor. Biol.},
810 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
811 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
812 journal = {Biosystems},
824 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
826 title = {Genetic Network Analyzer: qualitative simulation
827 of genetic regulatory networks.},
828 journal = {Bioinformatics},
836 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
837 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
838 journal = {Genes, Genomes and Genomics},
850 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
851 title = {Analysing formal models of genetic regulatory networks with delays},
852 journal = {Int. J. Bioinformatics Res. Appl.},
858 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
859 publisher = {Inderscience Publishers},
860 address = {Inderscience Publishers, Geneva, SWITZERLAND},
863 author = {Richard, A.},
864 title = {Local negative circuits and fixed points in Boolean networks},
865 institution = {preprint arXiv number 0910.0750},
878 author = {Remy, R. and Ruet, P. and Thieffry, D.},
879 title = {Graphic requirement for multistability and attractive cycles in a
880 Boolean dynamical framework},
881 journal = {Advances in Applied Mathematics},
887 timestamp = {2009.02.05}
890 @inproceedings{DBLP:conf/icann/BahiCMMS06,
891 author = {Jacques M. Bahi and
892 Sylvain Contassot-Vivier and
896 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
897 in Heterogeneous Environments},
898 booktitle = {ICANN (2)},
901 ee = {http://dx.doi.org/10.1007/11840930_81},
902 crossref = {DBLP:conf/icann/2006-2},
903 bibsource = {DBLP, http://dblp.uni-trier.de}
906 @proceedings{DBLP:conf/icann/2006-2,
907 editor = {Stefanos D. Kollias and
908 Andreas Stafylopatis and
911 title = {Artificial Neural Networks - ICANN 2006, 16th International
912 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
914 booktitle = {ICANN (2)},
915 publisher = {Springer},
916 series = {Lecture Notes in Computer Science},
919 isbn = {3-540-38871-0},
920 bibsource = {DBLP, http://dblp.uni-trier.de}
927 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
929 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
930 publisher = {Eyrolles},
948 title = {An Introduction to Chaotic Dynamical Systems},
949 publisher = {Redwood City: Addison-Wesley},
951 author = {R. L. Devaney},
954 timestamp = {27/01/2008}
960 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
963 impact-factor ={1.255},
964 isi-acro = {MECHATRONICS},
965 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
966 title = {Active {MEMS}-based flow control using artificial neural network},
967 journal = {Mechatronics},
971 doi = {10.1016/j.mechatronics.2013.02.010},
972 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
973 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
974 publisher = {Elsevier},
977 note = {Available online. Paper version to appear},
982 @inproceedings{cds12:ip,
984 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
987 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
988 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
989 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
991 editor = {Bourgeois, Julien and de Labachelerie, Michel},
992 address = {Besan\c{c}on, France},
993 publisher = {IEEE CPS},
1002 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1004 classement = {ACLI},
1005 impact-factor ={2.081},
1007 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1008 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1009 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1012 pages = {013122-1 -- 013122-9},
1013 doi = {10.1063/1.3685524},
1014 url = {http://dx.doi.org/10.1063/1.3685524},
1015 publisher = {American Institute of Physics},
1023 @inproceedings{bgs11:ip,
1025 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1027 classement = {ACTI},
1028 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1029 title = {Building a Chaotic Proven Neural Network},
1030 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1031 address = {Maldives, Maldives},
1037 author = {Bahi, Jacques M. and Guyeux, Christophe},
1038 title = {Hash Functions Using Chaotic Iterations},
1039 journal = {Journal of Algorithms \& Computational Technology},
1044 classement = {ACLNI},
1045 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1047 impact-factor = {#},
1054 @PHDTHESIS{GuyeuxThese10,
1055 author = {Christophe Guyeux},
1056 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1057 en s\'{e}curit\'{e} informatique},
1058 school = {Universit\'{e} de Franche-Comt\'{e}},
1060 owner = {christophe},
1061 timestamp = {2010.12.21}
1064 @INPROCEEDINGS{gfb10:ip,
1065 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1066 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1067 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1068 Multimedia Signal Processing},
1071 address = {Darmstadt, Germany},
1073 classement = {ACTI},
1074 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1081 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1082 title = {Topological entropy},
1083 journal = {Transactions of the American Mathematical Society},
1088 timestamp = {2008.05.29}
1092 author = {Rufus Bowen},
1093 title = {Entropy for group endomorphisms and homogeneous spaces},
1094 journal = {Transactions of the American Mathematical Society},
1099 timestamp = {15/02/2008}
1102 @article{10.1109/CIMSiM.2010.36,
1103 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1104 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1105 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1109 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1110 publisher = {IEEE Computer Society},
1111 address = {Los Alamitos, CA, USA},
1113 @article{10.1109/ICME.2003.1221665,
1114 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1115 title = {Neural network based steganalysis in still images},
1116 journal ={Multimedia and Expo, IEEE International Conference on},
1120 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1121 publisher = {IEEE Computer Society},
1122 address = {Los Alamitos, CA, USA},
1125 @ARTICLE{Sullivan06steganalysisfor,
1126 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1127 title = {Steganalysis for Markov cover data with applications to images},
1128 journal = {IEEE Transactions on Information Forensics and Security},
1137 author = "Gray, Frank",
1138 title = "Pulse code communication",
1139 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1144 @INPROCEEDINGS{guyeux10ter,
1145 author = {Bahi, Jacques M. and Guyeux, Christophe},
1146 title = {A new chaos-based watermarking algorithm},
1147 booktitle = {SECRYPT'10, International Conference on Security
1151 address = {Athens, Greece},
1153 publisher = {SciTePress},
1154 classement = {ACTI},
1155 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1161 @inproceedings{Qiao:2009:SM:1704555.1704664,
1162 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1163 title = {Steganalysis of MP3Stego},
1164 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1165 series = {IJCNN'09},
1167 location = {Atlanta, Georgia, USA},
1168 pages = {2723--2728},
1170 publisher = {IEEE Press}
1173 @inproceedings{CouchotD07IFM,
1175 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1178 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1179 title = {Guiding the Correction of Parameterized Specifications},
1180 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1184 publisher = {Springer},
1185 doi = {10.1007/978-3-540-73210-5_10},
1186 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1187 address = {Oxford, UK},
1193 @inproceedings{couchot07FTP,
1197 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1198 title = {A Graph-based Strategy for the Selection of Hypotheses},
1199 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1200 address = {Liverpool, UK},
1207 @inproceedings{cgs09:ip,
1209 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1211 classement = {ACTI},
1212 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1213 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1214 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1215 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1216 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1217 publisher = {ACM Press},
1219 url = {http://arxiv.org/abs/0907.1357},
1220 otherUrl = {http://hal.inria.fr/inria-00402204},
1221 address = {Grenoble, France},
1222 editor = {Hassen Sa\"{i}di and N. Shankar},
1229 @inproceedings{couchot07cade,
1233 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1234 title = {Handling Polymorphism in Automated Deduction},
1235 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1239 publisher = {Springer},
1240 isbn = {978-3-540-73594-6},
1241 doi = {10.1007/978-3-540-73595-3_18},
1242 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1243 address = {Bremen, Germany},
1255 @inproceedings{BCDG07,
1257 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1258 equipe = {vesontio},
1259 classement = {ACTI},
1260 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1261 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1262 booktitle = {B'2007, the 7th Int. B Conference},
1266 publisher = {Springer},
1267 doi = {10.1007/11955757_10},
1268 url = {http://dx.doi.org/10.1007/11955757_10},
1269 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1270 address = {Besancon, France},
1278 @article{byrd1995limited,
1279 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1280 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1281 journal = {SIAM J. Sci. Comput.},
1282 issue_date = {Sept. 1995},
1288 pages = {1190--1208},
1290 url = {http://dx.doi.org/10.1137/0916069},
1291 doi = {10.1137/0916069},
1293 publisher = {Society for Industrial and Applied Mathematics},
1294 address = {Philadelphia, PA, USA},
1295 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1298 @article{ANU:1770520,
1299 author = {Powell,M. J. D.},
1300 title = {Direct search algorithms for optimization calculations},
1301 journal = {Acta Numerica},
1308 doi = {10.1017/S0962492900002841},
1309 URL = {http://journals.cambridge.org/article_S0962492900002841},
1315 journal={The Journal of Supercomputing},
1318 doi={10.1007/s11227-010-0500-5},
1319 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1320 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1321 publisher={Springer US},
1322 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1323 author={Wang, Honggang},
1329 author={Yifeng He and Lee, I. and Ling Guan},
1330 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1331 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1336 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1337 doi={10.1109/TCSVT.2009.2017411},
1341 author={Palomar, D.P. and Mung Chiang},
1342 journal={Selected Areas in Communications, IEEE Journal on},
1343 title={A tutorial on decomposition methods for network utility maximization},
1348 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1349 doi={10.1109/JSAC.2006.879350},
1354 journal={EURASIP Journal on Information Security},
1358 doi={10.1186/1687-417X-2014-1},
1359 title={Universal distortion function for steganography in an arbitrary domain},
1360 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1361 publisher={Springer International Publishing},
1362 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1366 @inproceedings{conf/wifs/HolubF12,
1367 added-at = {2013-01-23T00:00:00.000+0100},
1368 author = {Holub, Vojtech and Fridrich, Jessica J.},
1369 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1371 crossref = {conf/wifs/2012},
1372 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1373 interhash = {cbef658a6868216eef585dd759ae0668},
1374 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1375 isbn = {978-1-4673-2285-0},
1379 timestamp = {2013-01-23T00:00:00.000+0100},
1380 title = {Designing steganographic distortion using directional filters.},
1381 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1388 @article{FillerJF11,
1389 author = {Tom{\'a}s Filler and
1391 Jessica J. Fridrich},
1392 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1394 journal = {IEEE Transactions on Information Forensics and Security},
1399 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1400 bibsource = {DBLP, http://dblp.uni-trier.de}
1403 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1404 editor = {Ira S. Moskowitz},
1405 author = {Shelby Pereira and
1406 Sviatoslav Voloshynovskiy and
1408 St{\'e}phane Marchand-Maillet and
1410 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1411 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1412 title = {Second Generation Benchmarking and Application Oriented
1417 publisher = springer,
1418 address = springer_loc,
1424 @inproceedings{DBLP:conf/ih/Westfeld01,
1425 added-at = {2011-06-28T00:00:00.000+0200},
1426 author = {Westfeld, Andreas},
1427 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1428 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1429 editor = {Ira S. Moskowitz},
1431 publisher = springer,
1432 address = springer_loc,
1435 title = {F5-A Steganographic Algorithm.},
1444 @article{Chang20101286,
1445 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1446 journal = "Digital Signal Processing",
1449 pages = "1286 - 1307",
1453 doi = "10.1016/j.dsp.2009.11.005",
1454 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1455 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1456 keywords = "Security",
1457 keywords = "Wet paper coding",
1458 keywords = "Steganography",
1459 keywords = "Indicator",
1460 keywords = "Fuzzy edge detector"
1465 @article{Hu:2007:HPE:1282866.1282944,
1466 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1467 title = {A high performance edge detector based on fuzzy inference rules},
1468 journal = {Inf. Sci.},
1469 issue_date = {November, 2007},
1475 pages = {4768--4784},
1477 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1478 doi = {10.1016/j.ins.2007.04.001},
1480 publisher = {Elsevier Science Inc.},
1481 address = {New York, NY, USA},
1482 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1486 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1487 author = {Sorina Dumitrescu and
1489 editor = {Ahmet M. Eskicioglu and
1490 Jessica J. Fridrich and
1492 title = {LSB steganalysis based on high-order statistics},
1493 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1494 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1497 address = {New York, NY, USA},
1500 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1501 bibsource = {DBLP, http://dblp.uni-trier.de}
1504 @inproceedings{DBLP:conf/ih/Ker05,
1505 author = {Andrew D. Ker},
1506 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1507 editor = {Mauro Barni and
1508 Jordi Herrera-Joancomart\'{\i} and
1509 Stefan Katzenbeisser and
1510 Fernando P{\'e}rez-Gonz{\'a}lez},
1511 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1512 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1515 ee = {http://dx.doi.org/10.1007/11558859_22},
1516 publisher = springer,
1517 address = springer_loc,
1524 @inproceedings{FK12,
1525 editor = {Matthias Kirchner and
1527 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1528 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1529 author = {Jessica J. Fridrich and
1531 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1535 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1537 publisher = springer,
1538 address = springer_loc,
1540 bibsource = {DBLP, http://dblp.uni-trier.de}
1544 @article{DBLP:journals/tsp/DumitrescuWW03,
1545 added-at = {2012-02-06T00:00:00.000+0100},
1546 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1547 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1548 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1549 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1550 intrahash = {556caad9b61980d3458885153a52321c},
1551 journal = {IEEE Transactions on Signal Processing},
1554 pages = {1995-2007},
1555 timestamp = {2012-02-06T00:00:00.000+0100},
1556 title = {Detection of LSB steganography via sample pair analysis.},
1557 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1565 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1566 editor = {Nicolas D. Georganas and
1567 Radu Popescu-Zeletin},
1568 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1569 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1571 author = {Jessica J. Fridrich and
1574 title = {Reliable detection of LSB steganography in color and grayscale
1578 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1580 address = {New York, NY, USA},
1582 bibsource = {DBLP, http://dblp.uni-trier.de}
1589 @inproceedings{DBLP:conf/ih/PevnyFB10,
1590 author = {Tom{\'a}s Pevn{\'y} and
1591 Tom{\'a}s Filler and
1593 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1595 editor = {Rainer B{\"o}hme and
1596 Philip W. L. Fong and
1597 Reihaneh Safavi-Naini},
1598 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1599 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1604 publisher = springer,
1605 address = springer_loc,
1608 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1609 bibsource = {DBLP, http://dblp.uni-trier.de}
1618 author = {Tom{\'a}s Pevn{\'y} and
1619 Tom{\'a}s Filler and
1622 title = {Break Our Steganographic System},
1623 OPThowpublished = {},
1626 note = {Available at \url{http://www.agents.cz/boss/}},
1630 @proceedings{DBLP:conf/ih/2010,
1631 editor = {Rainer B{\"o}hme and
1632 Philip W. L. Fong and
1633 Reihaneh Safavi-Naini},
1634 title = {Information Hiding - 12th International Conference, IH 2010,
1635 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1637 booktitle = {Information Hiding},
1638 publisher = springer,
1639 address = springer_loc,
1643 isbn = {978-3-642-16434-7},
1644 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1645 bibsource = {DBLP, http://dblp.uni-trier.de}
1649 @article{DBLP:journals/eswa/ChenCL10,
1650 added-at = {2010-07-21T15:44:10.000+0200},
1651 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1652 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1653 date = {2010-05-03},
1654 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1655 interhash = {bc34a5f04661fee24ee62c39e76361be},
1656 intrahash = {28889a4ab329da28559f0910469f054b},
1657 journal = {Expert Systems with Applications},
1660 pages = {3292-3301},
1661 timestamp = {2010-07-21T15:44:10.000+0200},
1662 title = {High payload steganography mechanism using hybrid edge detector.},
1663 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1668 @article{DBLP:journals/tifs/FillerJF11,
1669 added-at = {2011-09-29T00:00:00.000+0200},
1670 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1671 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1672 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1673 interhash = {b27d23ed0c9936d568e16c51378abccd},
1674 intrahash = {50e43c05a74eec17524b3df8db442da5},
1675 journal = {IEEE Transactions on Information Forensics and Security},
1679 timestamp = {2011-09-29T00:00:00.000+0200},
1680 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1681 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1689 @inproceedings{DBLP:conf/ih/KimDR06,
1690 added-at = {2007-09-20T00:00:00.000+0200},
1691 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1692 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1693 booktitle = {Information Hiding},
1694 crossref = {DBLP:conf/ih/2006},
1695 date = {2007-09-20},
1696 description = {dblp},
1697 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1698 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1699 interhash = {399aab122b39cfd6f6e951a1b276c786},
1700 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1701 isbn = {978-3-540-74123-7},
1705 publisher = springer,
1706 address = springer_loc,
1708 timestamp = {2007-09-20T00:00:00.000+0200},
1709 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1710 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1716 @proceedings{DBLP:conf/ih/2006,
1717 editor = {Jan Camenisch and
1718 Christian S. Collberg and
1721 title = {Information Hiding, 8th International Workshop, IH 2006,
1722 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1723 booktitle = {Information Hiding},
1724 publisher = springer,
1725 address = springer_loc,
1729 isbn = {978-3-540-74123-7},
1730 bibsource = {DBLP, http://dblp.uni-trier.de}
1735 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1736 author = {Jessica J. Fridrich and
1737 Tom{\'a}s Pevn{\'y} and
1739 title = {Statistically undetectable jpeg steganography: dead ends
1740 challenges, and opportunities},
1742 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1743 editor = {Deepa Kundur and
1744 Balakrishnan Prabhakaran and
1746 Jessica J. Fridrich},
1747 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1748 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1750 address = {New York, NY, USA},
1753 isbn = {978-1-59593-857-2},
1754 bibsource = {DBLP, http://dblp.uni-trier.de}
1760 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1761 editor = {Nasir D. Memon and
1763 Adnan M. Alattar and
1765 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1766 Electronic Imaging Symposium, San Jose, CA, USA, January
1767 18-20, 2010, Proceedings},
1768 author = {Tom{\'a}s Filler and
1770 Jessica J. Fridrich},
1771 title = {Minimizing embedding impact in steganography using trellis-coded
1775 ee = {http://dx.doi.org/10.1117/12.838002},
1776 bibsource = {DBLP, http://dblp.uni-trier.de},
1780 series = {SPIE Proceedings},
1791 @proceedings{DBLP:conf/mediaforensics/2010,
1792 editor = {Nasir D. Memon and
1794 Adnan M. Alattar and
1796 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1797 Electronic Imaging Symposium, San Jose, CA, USA, January
1798 18-20, 2010, Proceedings},
1799 booktitle = {Media Forensics and Security},
1802 series = {SPIE Proceedings},
1805 isbn = {978-0-8194-7934-1},
1806 bibsource = {DBLP, http://dblp.uni-trier.de}
1809 @article{DBLP:journals/corr/abs-1112-5239,
1810 author = {Jacques M. Bahi and
1811 Rapha{\"e}l Couturier and
1812 Christophe Guyeux and
1813 Pierre-Cyrille H{\'e}am},
1814 title = {Efficient and Cryptographically Secure Generation of Chaotic
1815 Pseudorandom Numbers on GPU},
1817 volume = {abs/1112.5239},
1819 ee = {http://arxiv.org/abs/1112.5239},
1820 bibsource = {DBLP, http://dblp.uni-trier.de}
1824 author = {Ponomarenko, Nikolay},
1825 title = {PSNR-HVS-M page},
1826 OPThowpublished = {},
1829 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1835 author = {Bovik, Alan C.},
1836 title = {BIQI page},
1837 OPThowpublished = {},
1840 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1845 @InProceedings{PSECAL07,
1846 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1847 title = {On between-coefficient contrast masking of DCT basis functions},
1848 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1851 editor = {Li,Baoxin},
1857 OPTorganization = {},
1865 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1866 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1867 journal = {IEEE Signal Processing Letters},
1878 @inproceedings{DBLP:conf/crypto/ShubBB82,
1879 author = {Lenore Blum and
1882 title = {Comparison of Two Pseudo-Random Number Generators},
1883 editor = {David Chaum and
1884 Ronald L. Rivest and
1886 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1887 Barbara, California, USA, August 23-25, 1982},
1889 bibsource = {DBLP, http://dblp.uni-trier.de},
1890 publisher = {Plenum Press},
1891 address={New York, NY, USA},
1894 bibsource = {DBLP, http://dblp.uni-trier.de}
1898 @inproceedings{Blum:1985:EPP:19478.19501,
1899 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1900 Barbara, California, USA, August 19-22, 1984, Proceedings},
1901 author = {Manuel Blum and
1903 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1904 Which Hides All Partial Information},
1908 editor = {G. R. Blakley and
1910 publisher = springer,
1911 address = springer_loc,
1918 @article{DBLP:journals/ejisec/FontaineG07,
1919 author = {Caroline Fontaine and
1921 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1922 journal = {EURASIP Journal on Information Security},
1927 ee = {http://dx.doi.org/10.1155/2007/13801},
1928 bibsource = {DBLP, http://dblp.uni-trier.de}
1932 @article{Luo:2010:EAI:1824719.1824720,
1933 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1934 title = {Edge adaptive image steganography based on LSB matching revisited},
1935 journal = {IEEE Transactions on Information Forensics and Security},
1943 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1944 doi = {10.1109/TIFS.2010.2041812},
1946 publisher = {IEEE Press},
1947 address = {Piscataway, NJ, USA},
1948 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1951 @article{Mielikainen06,
1952 author = {Mielikainen, J.},
1953 title = {LSB Matching Revisited},
1954 journal = {IEEE Signal Processing Letters},
1969 @article{Liu:2008:FMP:1284917.1285196,
1970 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1971 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1972 journal = {Pattern Recogn.},
1973 issue_date = {January, 2008},
1981 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1982 doi = {10.1016/j.patcog.2007.06.005},
1984 publisher = {Elsevier Science Inc.},
1985 address = {New York, NY, USA},
1986 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1991 @InProceedings{LHS08,
1992 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1993 title = {Textural features based universal steganalysis},
1996 booktitle = {Proc. SPIE 6819},
2007 OPTorganization = {},
2014 @InProceedings{KF11,
2015 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2016 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2019 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2023 pages = {78800L-78800L-13},
2032 OPTorganization = {},
2038 @article{DBLP:journals/tifs/KodovskyFH12,
2039 author = {Jan Kodovsk{\'y} and
2040 Jessica J. Fridrich and
2042 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2043 journal = {IEEE Transactions on Information Forensics and Security},
2048 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2049 bibsource = {DBLP, http://dblp.uni-trier.de}
2054 @article{Fillatre:2012:ASL:2333143.2333587,
2055 author = {Fillatre, Lionel},
2056 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2057 journal = {IEEE Transactions on Signal Processing},
2065 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2066 doi = {10.1109/TSP.2011.2174231},
2068 publisher = {IEEE Press},
2069 address = {Piscataway, NJ, USA},
2073 @inproceedings{Tyan1993,
2074 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2075 address = ieecs_loc,
2077 author = {Tyan, C. Y. and Wang, P. P.},
2078 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2079 citeulike-article-id = {7936501},
2080 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2082 posted-at = {2010-10-01 17:27:48},
2085 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2091 @article{Canny:1986:CAE:11274.11275,
2092 author = {Canny, J},
2093 title = {A Computational Approach to Edge Detection},
2094 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2095 issue_date = {June 1986},
2103 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2104 doi = {10.1109/TPAMI.1986.4767851},
2106 publisher = {IEEE Computer Society},
2107 address = {Washington, DC, USA},
2108 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2112 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2113 author = {Jessica J. Fridrich and
2114 Jan Kodovsk{\'y} and
2117 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2119 booktitle = {Information Hiding},
2122 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2123 crossref = {DBLP:conf/ih/2011},
2124 bibsource = {DBLP, http://dblp.uni-trier.de}
2126 @proceedings{DBLP:conf/ih/2011,
2127 editor = {Tom{\'a}s Filler and
2128 Tom{\'a}s Pevn{\'y} and
2131 title = {Information Hiding - 13th International Conference, IH 2011,
2132 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2134 booktitle = {Information Hiding},
2135 publisher = springer,
2136 address = springer_loc,
2140 isbn = {978-3-642-24177-2},
2141 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2142 bibsource = {DBLP, http://dblp.uni-trier.de}
2145 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2146 author = {Jessica J. Fridrich},
2147 title = {Modern Trends in Steganography and Steganalysis},
2151 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2152 crossref = {DBLP:conf/iwdw/2011},
2153 bibsource = {DBLP, http://dblp.uni-trier.de}
2155 @proceedings{DBLP:conf/iwdw/2011,
2156 editor = {Yun-Qing Shi and
2157 Hyoung-Joong Kim and
2158 Fernando P{\'e}rez-Gonz{\'a}lez},
2159 title = {Digital Forensics and Watermarking - 10th International
2160 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2161 2011, Revised Selected Papers},
2163 publisher = springer,
2164 address = springer_loc,
2168 isbn = {978-3-642-32204-4},
2169 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2170 bibsource = {DBLP, http://dblp.uni-trier.de}
2176 @article{MCErlang07,
2177 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2178 title = {McErlang: a model checker for a distributed functional programming language},
2179 journal = {SIGPLAN Not.},
2188 @inproceedings{Bogor03,
2190 Matthew B. Dwyer and
2192 title = {Bogor: an extensible and highly-modular software model checking
2194 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2195 of Software Engineering 2003},
2203 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2204 title = {On Devaney's Definition of Chaos},
2205 journal = {Amer. Math. Monthly},
2211 timestamp = {27/01/2008}
2214 @article{Crook2007267,
2215 title = "Pattern recall in networks of chaotic neurons",
2216 journal = "Biosystems",
2219 pages = "267 - 274",
2222 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2223 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2225 keywords = "Spiking neural network"
2229 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2230 title = {A novel Hash algorithm construction based on chaotic neural network},
2231 journal = {Neural Computing and Applications},
2234 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2237 keyword = {Computer Science},
2238 publisher = {Springer London}
2242 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2243 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2249 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2250 doi={10.1109/TCE.2004.1309431},
2253 @article{Zhang2005759,
2254 title = "An image encryption approach based on chaotic maps",
2255 journal = "Chaos, Solitons \& Fractals",
2258 pages = "759 - 765",
2262 doi = "10.1016/j.chaos.2004.09.035",
2263 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2266 @article{Lian20091296,
2267 title = "A block cipher based on chaotic neural networks",
2268 journal = "Neurocomputing",
2271 pages = "1296 - 1301",
2274 author = "Shiguo Lian",
2275 keywords = "Neural network",
2277 keywords = "Security",
2278 keywords = "Block cipher",
2279 keywords = "Image encryption"
2283 author = {George Cybenko},
2284 title = {Approximation by Superpositions of a Sigmoidal function},
2285 journal = {Mathematics of Control, Signals and Systems},
2292 @article{DBLP:journals/nn/HornikSW89,
2293 author = {Kurt Hornik and
2294 Maxwell B. Stinchcombe and
2296 title = {Multilayer feedforward networks are universal approximators},
2297 journal = {Neural Networks},
2302 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2303 bibsource = {DBLP, http://dblp.uni-trier.de}
2306 @article{dalkiran10,
2307 author = {Ilker Dalkiran and Kenan Danisman},
2308 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2309 title = {Artificial neural network based chaotic generator for cryptology},
2317 @article{springerlink:10.1007/s00521-010-0432-2,
2318 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2319 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2320 title = {A novel Hash algorithm construction based on chaotic neural network},
2321 journal = {Neural Computing and Applications},
2322 publisher = {Springer},
2324 keyword = {Computer Science},
2330 @article{Feder2009NTB,
2331 author = {Feder, Tom\'{a}s and Subi, Carlos},
2332 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2333 journal = {Inf. Process. Lett.},
2334 issue_date = {February, 2009},
2342 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2343 doi = {10.1016/j.ipl.2008.10.015},
2345 publisher = {Elsevier North-Holland, Inc.},
2346 address = {Amsterdam, The Netherlands, The Netherlands},
2347 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2353 author={Zanten, A.~J.~van and Suparta, I.~N.},
2354 title={ Totally balanced and exponentially balanced Gray codes},
2355 journal={Discrete Analysis and Operational Research},
2363 @book{LevinPeresWilmer2006,
2364 added-at = {2010-01-19T17:51:27.000+0100},
2365 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2366 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2367 interhash = {61354795a6accb6407bfdbf04753a683},
2368 intrahash = {097dc4d1d0e412b2444f540b04110797},
2369 keywords = {markovchains probabilitytheory textbook},
2370 publisher = {American Mathematical Society},
2371 timestamp = {2010-01-19T17:51:27.000+0100},
2372 title = {{Markov chains and mixing times}},
2373 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2378 author = {M. Mitzenmacher and Eli Upfal},
2380 title = {Probability and Computing},
2381 publisher = {Cambridge University Press},
2387 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2390 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2391 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2392 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},