-c% This file was created with JabRef 2.3.1.
+% This file was created with JabRef 2.3.1.
% Encoding: ANSI_X3.4-1968
+
+@article{BDCC16,
+year={2015},
+journal={Multimedia Tools and Applications},
+title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
+publisher={Springer US},
+author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and
+Couturier, Raphaël},
+note={to appear},
+}
+
+
+
+@inproceedings{CW99,
+author = {Chen, Brian and Wornell, Gregory W.},
+title = {Provably robust digital watermarking},
+journal = {Proc. SPIE},
+volume = {3845},
+number = {},
+pages = {43-54},
+year = {1999},
+doi = {10.1117/12.371232},
+URL = { http://dx.doi.org/10.1117/12.371232},
+eprint = {}
+}
+
+@INPROCEEDINGS{DM10,
+author={Darazi, R. and Hu, R. and Macq, B.},
+booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
+title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
+year={2010},
+pages={1742-1745},
+keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
+doi={10.1109/ICASSP.2010.5495455},
+ISSN={1520-6149},
+month={March},}
+
+@INPROCEEDINGS{WLSYNW13,
+author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
+booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
+title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
+year={2013},
+pages={4522-4526},
+keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
+doi={10.1109/ICIP.2013.6738931},
+month={Sept},}
+
+
+@article{CW01,
+year={2001},
+issn={0922-5773},
+journal={Journal of VLSI signal processing systems for signal, image and video technology},
+volume={27},
+number={1-2},
+title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
+publisher={Kluwer Academic Publishers},
+keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
+author={Chen, Brian and Wornell, Gregory W.},
+pages={7--33}
+}
+
+@InProceedings{WT08,
+ author = {Wang, C. T. and Tsai, W. H. },
+ title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
+ OPTcrossref = {},
+ OPTkey = {},
+ booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ pages = {1--6},
+ OPTmonth = {},
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/sigpro/LeeT10,
+ author = {I{-}Shi Lee and
+ Wen{-}Hsiang Tsai},
+ title = {A new approach to covert communication via {PDF} files},
+ journal = {Signal Processing},
+ volume = {90},
+ number = {2},
+ pages = {557--565},
+ year = {2010},
+ url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
+ doi = {10.1016/j.sigpro.2009.07.022},
+ timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@Article{LLGC13,
+ author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
+ title = {A Copyright Protection Scheme Based on PDF},
+ journal = {International Journal of Innovative Computing, Information and Control},
+ year = {2013},
+ OPTkey = {},
+ volume = {9},
+ number = {1},
+ pages = {1--6},
+ OPTmonth = {},
+ note = {ISSN 1349-4198},
+ OPTannote = {}
+}
+
+@Misc{ACDV12,
+ author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
+ title = {Using Steganography to hide messages inside PDF files},
+ howpublished = {SSN Project Report},
+ month = dec,
+ year = {2012},
+ OPTnote = {34p,}
+}
+
+@InProceedings{PD2008,
+ author = {POR, L. Y. and Delina, B.},
+ title = {Information Hiding: A New Approach in Text Steganography},
+ booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTpages = {},
+ month = apr,
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/tifs/PevnyBF10,
+ author = {Tom{\'{a}}s Pevn{\'{y}} and
+ Patrick Bas and
+ Jessica J. Fridrich},
+ title = {Steganalysis by subtractive pixel adjacency matrix},
+ journal = {{IEEE} Transactions on Information Forensics and Security},
+ volume = {5},
+ number = {2},
+ pages = {215--224},
+ year = {2010},
+ url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
+ doi = {10.1109/TIFS.2010.2045842},
+ timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@INPROCEEDINGS{rifq/others03,
+ author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4425},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of resemblance},
+ booktitle = {{IFSA}'03},
+ year = {2003},
+ location = {Istanbul, Turkey}
+}
+
+
+@ARTICLE{Rifqi:2000:DPM:342947.342970,
+ author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4417},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of comparison},
+ journal = {{F}uzzy {S}ets and {S}ystems},
+ volume = {110},
+ year = {2000},
+ pages = {189-196}
+}
+
+
+
+@book{Anderberg-Cluster-1973,
+ added-at = {2008-10-29T00:31:48.000+0100},
+ author = {Anderberg, M. R.},
+ biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
+ interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
+ intrahash = {f586cc49441c591f06539d11d3e06006},
+ keywords = {cluster_analysis wismasys0809},
+ publisher = {Academic Press},
+ timestamp = {2008-10-29T00:31:48.000+0100},
+ title = {Cluster Analysis for Applications},
+ year = 1973
+}
+
+
+
+@article{yule1950introduction,
+ Author = {Yule, G.U. and Kendall, MG},
+ Date-Added = {2009-08-14 22:16:50 -0500},
+ Date-Modified = {2009-08-14 22:16:50 -0500},
+ Journal = {Statistics},
+ Title = {An Introduction to the Theory of},
+ Year = {1950}}
+
+
+@inproceedings{fgb11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
+title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
+booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
+pages = {218--227},
+address = {Sevilla, Spain},
+editor = {Javier Lopez and Pierangela Samarati},
+publisher = {SciTePress},
+month = jul,
+year = 2011,
+
+}
+
+
+@ARTICLE{Cayre2008,
+ author = {Cayre, F. and Bas, P.},
+ title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
+ journal = {IEEE Transactions on Information Forensics and Security},
+ year = {2008},
+ volume = {3},
+ pages = {1--15},
+ number = {1},
+ doi = {10.1109/TIFS.2007.916006},
+ issn = {1556-6013},
+ keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
+ security, watermarking, Kerckhoffs-based embedding security classes,
+ WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
+ steganography security, watermark-only-attack, watermarking, Security,
+ spread-spectrum (SS) watermarking},
+ owner = {guyeux},
+ timestamp = {2009.06.29}
+}
+@INPROCEEDINGS{Perez06,
+ author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
+ title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
+ Approach},
+ booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
+ year = {2006},
+ volume =6072,
+ pages={1--12},
+ month = jan,
+ publisher = spie,
+ address = spie_loc
+}
+
+
+
+@ARTICLE{Cayre2005,
+ author = {Cayre, F. and Fontaine, C. and Furon, T.},
+ title = {Watermarking security: theory and practice},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2005},
+ volume = {53},
+ pages = {3976--3987},
+ number = {10},
+ keywords = {blind source separation, cryptography, watermarking, Fisher information
+ matrix, blind source separation, cryptanalysis, information theory,
+ spread spectrum techniques, substitutive scheme, watermarking security,
+ Blind source separation, Fisher information matrix, equivocation,
+ security, watermarking}
+}
+
+
+
+@inproceedings{Shujun1,
+ author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
+ title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
+ Their Roles in Cryptography and Pseudo-Random Coding},
+ booktitle = {Cryptography and Coding, 8th IMA International Conference,
+ Cirencester, UK},
+ month=dec,
+ year = 2001,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
+ volume = {2260},
+ pages = {205--221}}
+
+
+@misc{cgh16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
+title = {Random Walk in a N-cube Without Hamiltonian Cycle
+ to Chaotic Pseudorandom Number Generation: Theoretical and Practical
+ Considerations},
+howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
+month = mar,
+year = 2015,
+}
+
+
+@misc{bgco16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
+title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
+howpublished = {in submission to the ACM Computing Surveys journal},
+month = aug,
+year = 2015,
+}
+
+@misc{bdcc15:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {
+Bitar, Ahmad and
+Darazi, Rony and
+Couchot, Jean-Fran{\c}cois and
+Couturier, Rapha\¨el},
+title = {Blind digital watermarking in PDF documents using
+Spread Transform Dither Modulation},
+howpublished = {in submission to the Multimedia Tools and Applications journal},
+month = dec,
+year = 2014
+}
+
+
+
+
+
+@inproceedings{couchot04:onp,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois},
+title = {V\'erification d'invariant par superposition},
+booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
+address = {Calais, France},
+ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
+url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
+note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
+abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
+month = oct,
+year = 2004,
+
+}
+
+
+
+
+@inproceedings{aangc+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
+booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
+pages = {379--390},
+doi = {10.1007/978-3-319-16483-0_38},
+url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
+series = {LNCS},
+volume = 9043,
+address = {Granada, Spain},
+month = apr,
+year = 2015,
+
+}
+
+
+
+
+
+
+
+@inproceedings{agcs+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
+affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
+title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
+booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
+pages = {***--***},
+series = {LNCS/LNBI},
+volume = {*},
+publisher = {Springer},
+address = {Mexico City, Mexico},
+day = 4,
+month = aug,
+year = 2015,
+note = {To appear in the LNCS/LNBI series},
+
+}
+
+
+
+@inproceedings{bcg11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
+booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+pages = {52--57},
+address = {Luxembourg, Luxembourg},
+month = jun,
+year = 2011,
+note = {Best paper award},
+
+}
+
+@article{bcg12:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLNI},
+impact-factor ={#},
+isi-acro = {#},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Quality analysis of a chaotic proven keyed hash function},
+journal = {International Journal On Advances in Internet Technology},
+pages = {26--33},
+volume = 5,
+number = 1,
+publisher = {IARIA},
+year = 2012,
+
+}
+
+
+@article{ccg15:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={#},
+isi-acro = {#},
+author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
+title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
+journal = {Annals of Telecommunications},
+doi = {10.1007/s12243-015-0466-7},
+url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
+publisher = {Springer},
+year = 2015,
+note = {Available online. Paper version to appear},
+
+}
+
+@inproceedings{fccg15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
+title = {Steganalyzer performances in operational contexts},
+booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {***--***},
+address = {Adelaide, Australia},
+month = sep,
+year = 2015,
+note = {To appear},
+
+}
+
+
+@inproceedings{bcfg12a:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
+title = {Application of Steganography for Anonymity through the Internet},
+booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
+pages = {96--101},
+url = {http://arxiv.org/abs/1202.5302v1},
+address = {Venice, Italy},
+month = jun,
+year = 2012,
+
+}
+
+
+@inproceedings{bcfg+13:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
+title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
+booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {547--550},
+doi = {10.1109/IIH-MSP.2013.141},
+url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
+address = {Beijing, China},
+month = oct,
+year = 2013,
+
+}
+
+@inproceedings{bcfg12b:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
+title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
+booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
+pages = {71--76},
+address = {Venice, Italy},
+month = jun,
+year = 2012,
+
+}
+
+
+
+
+
+@inproceedings{bcg11b:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Steganography: a Class of Algorithms having Secure Properties},
+booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {109--112},
+address = {Dalian, China},
+month = oct,
+year = 2011,
+
+}
+
+
+@article{bcg11:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={1.363},
+isi-acro = {COMPUT J},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Steganography: a class of secure and robust algorithms},
+journal = {The Computer Journal},
+volume = 55,
+number = 6,
+pages = {653--666},
+doi = {10.1093/comjnl/bxr116},
+url = {http://dx.doi.org/10.1093/comjnl/bxr116},
+publisher = {Oxford University Press},
+year = 2012,
+}
+
+
+
+@inproceedings{bcgw11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
+title = {Class of Trustworthy Pseudo Random Number Generators},
+booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+pages = {72--77},
+address = {Luxembourg, Luxembourg},
+month = jun,
+year = 2011,
+
+}
+
+@misc{chgw+14:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
+title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
+howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
+day = 23,
+month = sep,
+year = 2014,
+}
+
+
+
+
+
+@inproceedings{aagp+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTIN},
+author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
+title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
+booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
+pages = {***--***},
+address = {Naples, Italy},
+day = 10,
+month = sep,
+year = 2015,
+note = {To appear},
+
+}
+
+@inproceedings{acgm+14:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
+title = {Finding the Core-Genes of Chloroplasts},
+booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
+pages = {357--364},
+series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
+number = {4(5)},
+doi = {10.7763/IJBBB.2014.V4.371},
+url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
+address = {Copenhagen, Denmark},
+day = 18,
+month = jun,
+year = 2014,
+
+}
+
+
+
+
+@inproceedings{akgcs+14:oip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
+booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
+address = {Belfast, United Kingdom},
+day = 2,
+month = nov,
+year = 2014,
+note = {Short paper},
+}
+
+@misc{acgs13:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
+title = {Finding the core-genes of Chloroplast Species},
+howpublished = {Journ\'ees SeqBio 2013, Montpellier},
+month = nov,
+year = 2013,
+
+}
+
+
+
+
+
+@PhdThesis{guyeuxphd,
+author = {Guyeux, Christophe},
+title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
+type = {Th\`ese de {D}octorat},
+school = {LIFC, Universit\'e de Franche-Comt\'e},
+equipe = {AND},
+note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
+month = {13 décembre},
+year = 2010,
+
+}
+
+@inproceedings{chgw+14:oip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
+equipe = {ie},
+author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
+title = {Pseudorandom Number Generators with Balanced Gray Codes},
+booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
+pages = {469--475},
+address = {Vienna, Austria},
+month = aug,
+date = aug,
+year = 2014
+}
+
+
+
+
@INPROCEEDINGS{nusmv02,
author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
crossref = {DBLP:conf/cav/2002}
}
+@unpublished{Cha06,
+author = {Nishanth Chandrasekaran},
+title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
+year = 2006,
+}
+
+@InProceedings{GO01,
+ Author = "Gastin, P. and Oddoux, D.",
+ Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
+ BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
+ Publisher = "Springer",
+ Series = lncs,
+ Number = 2102,
+ Year = 2001,
+ Pages = "53--65"
+}
+
+@inproceedings{cg04:np,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
+title = {Analyse d'atteignabilit\'e d\'eductive},
+booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
+pages = {269--283},
+editor = {Julliand, Jacques},
+address = {Besan\c{c}on, France},
+month = jun,
+year = 2004,
+
+}
+
+
+@article{cdgr03:ij,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
+journal = {Journal of the Brazilian Computer Society (JBCS)},
+volume = 9,
+number = 2,
+pages = {17--36},
+url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
+month = nov,
+year = 2003,
+note = {ISSN 0104-6500},
+
+}
+
+
+@inproceedings{cddg+04:ip,
+inhal = {no},
+domainehal = {INFO:INFO_SE, INFO:INFO_MO},
+equipe = {vesontio},
+author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {Proving and Debugging Set-Based Specifications},
+booktitle = {WMF'03 proceedings},
+series = {ENTCS, Electronic Notes in Theoretical Computer Science},
+volume = 95,
+pages = {189--208},
+editor = {A. Cavalcanti and P. Machado},
+address = {Campina Grande, Brazil},
+url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
+month = may,
+year = 2004,
+
+}
+
+
+@inproceedings{cdgr04:onp,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
+pages = {369--372},
+booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
+address = {Besan\c{c}on, France},
+month = jun,
+year = 2004,
+editor = {Julliand, Jacques},
+note = {Session outils},
+
+}
+
+
@INPROCEEDINGS{CGK05,
author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
title = {A uniform deductive approach for parameterized protocol safety},
number = {6}
}
+
+@inproceedings{bcgr11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
+title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
+booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
+series = {LNCS},
+volume = 6914,
+pages = {126--137},
+doi = {10.1007/978-3-642-22953-4_11},
+url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
+address = {Oslo, Norway},
+month = aug,
+year = 2011,
+
+}
+
+
+
@techreport{BCVC10:ir,
author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
title = {Convergence Results of Combining Synchronism and Asynchronism for
author = {Couchot, J.-F.},
title = {Formal {C}onvergence {P}roof for {D}iscrete
{D}ynamical {S}ystems},
- year = {2010},
institution = {LIFC - Laboratoire d’{I}nformatique de
l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
type = {Research Report},
-@BOOK{Dev89,
+@BOOK{Devaney,
title = {An Introduction to Chaotic Dynamical Systems},
publisher = {Redwood City: Addison-Wesley},
year = {1989},
}
+@article{cds13:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={1.255},
+isi-acro = {MECHATRONICS},
+author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
+title = {Active {MEMS}-based flow control using artificial neural network},
+journal = {Mechatronics},
+volume = 23,
+number = 7,
+pages = {898--905},
+doi = {10.1016/j.mechatronics.2013.02.010},
+url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
+abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
+publisher = {Elsevier},
+month = oct,
+year = 2013,
+note = {Available online. Paper version to appear},
+
+}
+
+
+@inproceedings{cds12:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
+title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
+booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
+pages = {1--6},
+editor = {Bourgeois, Julien and de Labachelerie, Michel},
+address = {Besan\c{c}on, France},
+publisher = {IEEE CPS},
+month = apr,
+year = 2012,
+
+}
+
+
+@article{bcgs12:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={2.081},
+isi-acro = {CHAOS},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
+title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
+journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
+volume = 22,
+number = 1,
+pages = {013122-1 -- 013122-9},
+doi = {10.1063/1.3685524},
+url = {http://dx.doi.org/10.1063/1.3685524},
+publisher = {American Institute of Physics},
+month = mar,
+year = 2012,
+note = {9 pages},
+
+}
+
+
+@inproceedings{bgs11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
+title = {Building a Chaotic Proven Neural Network},
+booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
+address = {Maldives, Maldives},
+month = may,
+year = 2011,
+}
+
+@ARTICLE{guyeux09,
+ author = {Bahi, Jacques M. and Guyeux, Christophe},
+ title = {Hash Functions Using Chaotic Iterations},
+ journal = {Journal of Algorithms \& Computational Technology},
+ year = {2010},
+ volume = {4},
+ pages = {167--181},
+ number = {2},
+ classement = {ACLNI},
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+ equipe = {and},
+ impact-factor = {#},
+ inhal = {no},
+ isi-acro = {#}
+}
+
+
+
+@PHDTHESIS{GuyeuxThese10,
+ author = {Christophe Guyeux},
+ title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
+ en s\'{e}curit\'{e} informatique},
+ school = {Universit\'{e} de Franche-Comt\'{e}},
+ year = {2010},
+ owner = {christophe},
+ timestamp = {2010.12.21}
+}
+
+@INPROCEEDINGS{gfb10:ip,
+ author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
+ title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
+ booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
+ Multimedia Signal Processing},
+ year = {2010},
+ pages = {208--211},
+ address = {Darmstadt, Germany},
+ month = oct,
+ classement = {ACTI},
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+ equipe = {and},
+ inhal = {no}
+}
+
+
+@ARTICLE{Adler65,
+ author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
+ title = {Topological entropy},
+ journal = {Transactions of the American Mathematical Society},
+ year = {1965},
+ volume = {114},
+ pages = {309-319},
+ owner = {guyeux},
+ timestamp = {2008.05.29}
+}
+
+@ARTICLE{Bowen,
+ author = {Rufus Bowen},
+ title = {Entropy for group endomorphisms and homogeneous spaces},
+ journal = {Transactions of the American Mathematical Society},
+ year = {1971},
+ volume = {153},
+ pages = {401-414},
+ owner = {guyeux},
+ timestamp = {15/02/2008}
+}
+
+@article{10.1109/CIMSiM.2010.36,
+author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
+title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
+journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
+volume = {0},
+year = {2010},
+pages = {15-20},
+doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
+publisher = {IEEE Computer Society},
+address = {Los Alamitos, CA, USA},
+}
+@article{10.1109/ICME.2003.1221665,
+author = {Liu Shaohui and Yao Hongxun and Gao Wen},
+title = {Neural network based steganalysis in still images},
+journal ={Multimedia and Expo, IEEE International Conference on},
+volume = {2},
+year = {2003},
+pages = {509-512},
+doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
+publisher = {IEEE Computer Society},
+address = {Los Alamitos, CA, USA},
+}
+
+@ARTICLE{Sullivan06steganalysisfor,
+ author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
+ title = {Steganalysis for Markov cover data with applications to images},
+ journal = {IEEE Transactions on Information Forensics and Security},
+ year = {2006},
+ volume = {1},
+ pages = {275--287}
+}
+
+
+@misc{Gray47,
+year=1953,
+author = "Gray, Frank",
+title = "Pulse code communication",
+note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
+
+
+
+
+@INPROCEEDINGS{guyeux10ter,
+ author = {Bahi, Jacques M. and Guyeux, Christophe},
+ title = {A new chaos-based watermarking algorithm},
+ booktitle = {SECRYPT'10, International Conference on Security
+and Cryptography},
+ year = {2010},
+ pages = {455--458},
+ address = {Athens, Greece},
+ month = jul,
+ publisher = {SciTePress},
+ classement = {ACTI},
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+ equipe = {and},
+ inhal = {no}
+}
+
+
+@inproceedings{Qiao:2009:SM:1704555.1704664,
+ author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
+ title = {Steganalysis of MP3Stego},
+ booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
+ series = {IJCNN'09},
+ year = {2009},
+ location = {Atlanta, Georgia, USA},
+ pages = {2723--2728},
+ numpages = {6},
+ publisher = {IEEE Press}
+}
+
+@inproceedings{CouchotD07IFM,
+inhal = {no},
+domainehal = {INFO:INFO_SE, INFO:INFO_MO},
+equipe = {ie},
+classement = {*},
+author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
+title = {Guiding the Correction of Parameterized Specifications},
+booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
+pages = {176--194},
+series = {LNCS},
+volume = 4591,
+publisher = {Springer},
+doi = {10.1007/978-3-540-73210-5_10},
+url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
+address = {Oxford, UK},
+month = jul,
+year = 2007,
+
+}
+
+@inproceedings{couchot07FTP,
+inhal = {no},
+equipe = {and},
+classement = {*},
+author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
+title = {A Graph-based Strategy for the Selection of Hypotheses},
+booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
+address = {Liverpool, UK},
+month = sep,
+year = 2007,
+
+}
+
+
+@inproceedings{cgs09:ip,
+inhal = {inria},
+domainehal = {INFO:INFO_SE, INFO:INFO_MO},
+equipe = {ie},
+classement = {ACTI},
+author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
+title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
+abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
+affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
+booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
+publisher = {ACM Press},
+pages = {40--47},
+url = {http://arxiv.org/abs/0907.1357},
+otherUrl = {http://hal.inria.fr/inria-00402204},
+address = {Grenoble, France},
+editor = {Hassen Sa\"{i}di and N. Shankar},
+year = 2009,
+
+}
+
+
+
+@inproceedings{couchot07cade,
+inhal = {no},
+equipe = {and},
+classement = {*},
+author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
+title = {Handling Polymorphism in Automated Deduction},
+booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
+pages = {263--278},
+series = {LNCS},
+volume = 4603,
+publisher = {Springer},
+isbn = {978-3-540-73594-6},
+doi = {10.1007/978-3-540-73595-3_18},
+url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
+address = {Bremen, Germany},
+month = jul,
+year = 2007,
+
+}
+
+
+
+
+
+
+
+@inproceedings{BCDG07,
+inhal = {no},
+domainehal = {INFO:INFO_SE, INFO:INFO_MO},
+equipe = {vesontio},
+classement = {ACTI},
+author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
+title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
+booktitle = {B'2007, the 7th Int. B Conference},
+pages = {96--110},
+series = {LNCS},
+volume = 4355,
+publisher = {Springer},
+doi = {10.1007/11955757_10},
+url = {http://dx.doi.org/10.1007/11955757_10},
+editor = {Julliand, Jacques and Kouchnarenko, Olga},
+address = {Besancon, France},
+month = jan,
+year = 2007,
+
+}
+
+
@article{byrd1995limited,
author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
URL = {http://journals.cambridge.org/article_S0962492900002841},
}
-
+@article{Wang13,
+year={2013},
+issn={0920-8542},
+journal={The Journal of Supercomputing},
+volume={64},
+number={3},
+doi={10.1007/s11227-010-0500-5},
+title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
+url={http://dx.doi.org/10.1007/s11227-010-0500-5},
+publisher={Springer US},
+keywords={Watermarking; Authentication; Wireless multimedia sensor network},
+author={Wang, Honggang},
+pages={883-897},
+language={English}
+}
@ARTICLE{HLG09,
author={Yifeng He and Lee, I. and Ling Guan},
pages={704-718},
keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
doi={10.1109/TCSVT.2009.2017411},
-ISSN={1051-8215},}
+ISSN={1051-8215}}
@ARTICLE{PM06,
author={Palomar, D.P. and Mung Chiang},
pages={1439-1451},
keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
doi={10.1109/JSAC.2006.879350},
-ISSN={0733-8716},}
+ISSN={0733-8716}}
+
+@article{HFD14,
+year={2014},
+journal={EURASIP Journal on Information Security},
+eid={1},
+volume={2014},
+number={1},
+doi={10.1186/1687-417X-2014-1},
+title={Universal distortion function for steganography in an arbitrary domain},
+url={http://dx.doi.org/10.1186/1687-417X-2014-1},
+publisher={Springer International Publishing},
+author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
+language={English}
+}
+
+
+
+
+
+@inproceedings{conf/wifs/HolubF12,
+ added-at = {2013-01-23T00:00:00.000+0100},
+ author = {Holub, Vojtech and Fridrich, Jessica J.},
+ biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
+ booktitle = {WIFS},
+ crossref = {conf/wifs/2012},
+ ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
+ interhash = {cbef658a6868216eef585dd759ae0668},
+ intrahash = {a685b4b8b521ac99734fb52c064ca994},
+ isbn = {978-1-4673-2285-0},
+ keywords = {dblp},
+ pages = {234-239},
+ publisher = {IEEE},
+ timestamp = {2013-01-23T00:00:00.000+0100},
+ title = {Designing steganographic distortion using directional filters.},
+ url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
+ year = 2012
+}
+
+@proceedings{conf/wifs/2012,
+ title = {2012 {IEEE} International Workshop on Information Forensics and Security,
+ {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
+ publisher = {{IEEE}},
+ year = {2012},
+ url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
+ isbn = {978-1-4673-2285-0},
+ timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
@article{FillerJF11,
OPTannote = {}
}
+@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
+ author = {Jan Kodovský and
+ Tomás Pevný and
+ Jessica J. Fridrich},
+ title = {Modern steganalysis can detect YASS.},
+ booktitle = {Media Forensics and Security},
+ year = {2010},
+ pages = {754102},
+ ee = {http://dx.doi.org/10.1117/12.838768}
+}
+
@article{DBLP:journals/tifs/KodovskyFH12,
author = {Jan Kodovsk{\'y} and
Jessica J. Fridrich and
}
+
+
+@article{MCErlang07,
+ author = {Fredlund, Lars-\AAke and Svensson, Hans},
+ title = {McErlang: a model checker for a distributed functional programming language},
+ journal = {SIGPLAN Not.},
+ volume = {42},
+ issue = {9},
+ year = {2007},
+ issn = {0362-1340},
+ pages = {125--136},
+ numpages = {12},
+ publisher = {ACM},
+}
+@inproceedings{Bogor03,
+ author = {Robby and
+ Matthew B. Dwyer and
+ John Hatcliff},
+ title = {Bogor: an extensible and highly-modular software model checking
+ framework},
+ booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
+ of Software Engineering 2003},
+ publisher = {ACM},
+ year = {2003},
+ pages = {267-276},
+}
+
+
+@ARTICLE{Banks92,
+ author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
+ title = {On Devaney's Definition of Chaos},
+ journal = {Amer. Math. Monthly},
+ year = {1992},
+ volume = {99},
+ pages = {332--334},
+ keywords = {(c+),},
+ owner = {guyeux},
+ timestamp = {27/01/2008}
+}
+
+@article{Crook2007267,
+title = "Pattern recall in networks of chaotic neurons",
+journal = "Biosystems",
+volume = "87",
+number = "2-3",
+pages = "267 - 274",
+year = "2007",
+issn = "0303-2647",
+doi = "DOI: 10.1016/j.biosystems.2006.09.022",
+author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
+keywords = "Chaos",
+keywords = "Spiking neural network"
+}
+
+@ARTICLE{Xiao10,
+ author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
+ title = {A novel Hash algorithm construction based on chaotic neural network},
+ journal = {Neural Computing and Applications},
+ year = {2010},
+ pages = {1-9},
+ affiliation = {Chongqing University College of Computer Science 400044 Chongqing
+ China},
+ issn = {0941-0643},
+ keyword = {Computer Science},
+ publisher = {Springer London}
+}
+
+@ARTICLE{1309431,
+author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
+journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
+year={2004},
+month=may,
+volume={50},
+number={2},
+pages={ 587 - 590},
+keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
+doi={10.1109/TCE.2004.1309431},
+}
+
+@article{Zhang2005759,
+title = "An image encryption approach based on chaotic maps",
+journal = "Chaos, Solitons \& Fractals",
+volume = "24",
+number = "3",
+pages = "759 - 765",
+year = "2005",
+note = "",
+issn = "0960-0779",
+doi = "10.1016/j.chaos.2004.09.035",
+author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
+}
+
+@article{Lian20091296,
+title = "A block cipher based on chaotic neural networks",
+journal = "Neurocomputing",
+volume = "72",
+number = "4-6",
+pages = "1296 - 1301",
+year = "2009",
+issn = "0925-2312",
+author = "Shiguo Lian",
+keywords = "Neural network",
+keywords = "Chaos",
+keywords = "Security",
+keywords = "Block cipher",
+keywords = "Image encryption"
+}
+
+@article{Cybenko89,
+ author = {George Cybenko},
+ title = {Approximation by Superpositions of a Sigmoidal function},
+ journal = {Mathematics of Control, Signals and Systems},
+ volume = {2},
+ year = {1989},
+ pages = {303-314}
+}
+
+
+@article{DBLP:journals/nn/HornikSW89,
+ author = {Kurt Hornik and
+ Maxwell B. Stinchcombe and
+ Halbert White},
+ title = {Multilayer feedforward networks are universal approximators},
+ journal = {Neural Networks},
+ volume = {2},
+ number = {5},
+ year = {1989},
+ pages = {359-366},
+ ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+@article{dalkiran10,
+ author = {Ilker Dalkiran and Kenan Danisman},
+ affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
+ title = {Artificial neural network based chaotic generator for cryptology},
+ journal = TESC,
+ volume = {18},
+ number = {2},
+ pages = {225-240},
+ year = {2010}
+}
+
+@article{springerlink:10.1007/s00521-010-0432-2,
+ author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
+ affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
+ title = {A novel Hash algorithm construction based on chaotic neural network},
+ journal = {Neural Computing and Applications},
+ publisher = {Springer},
+ issn = {0941-0643},
+ keyword = {Computer Science},
+ pages = {1-9},
+ year = {2010}
+}
+
+
+@article{Feder2009NTB,
+ author = {Feder, Tom\'{a}s and Subi, Carlos},
+ title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
+ journal = {Inf. Process. Lett.},
+ issue_date = {February, 2009},
+ volume = {109},
+ number = {5},
+ month = feb,
+ year = {2009},
+ issn = {0020-0190},
+ pages = {267--272},
+ numpages = {6},
+ url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
+ doi = {10.1016/j.ipl.2008.10.015},
+ acmid = {1496515},
+ publisher = {Elsevier North-Holland, Inc.},
+ address = {Amsterdam, The Netherlands, The Netherlands},
+ keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
+}
+
+
+
+@Article{ZanSup04,
+ author={Zanten, A.~J.~van and Suparta, I.~N.},
+ title={ Totally balanced and exponentially balanced Gray codes},
+ journal={Discrete Analysis and Operational Research},
+ series={Ser.~1},
+ year={2004},
+ volume={11},
+ issue={4},
+ pages={81--98}
+}
+
+@book{LevinPeresWilmer2006,
+ added-at = {2010-01-19T17:51:27.000+0100},
+ author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
+ biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
+ interhash = {61354795a6accb6407bfdbf04753a683},
+ intrahash = {097dc4d1d0e412b2444f540b04110797},
+ keywords = {markovchains probabilitytheory textbook},
+ publisher = {American Mathematical Society},
+ timestamp = {2010-01-19T17:51:27.000+0100},
+ title = {{Markov chains and mixing times}},
+ url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
+ year = 2006
+}
+
+ @Book{proba,
+ author = {M. Mitzenmacher and Eli Upfal},
+ ALTeditor = {},
+ title = {Probability and Computing},
+ publisher = {Cambridge University Press},
+ year = {2005},
+}
+
+@misc{Mons14,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
+title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
+howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
+day = 23,
+month = sep,
+year = 2014,
+
+}