% This file was created with JabRef 2.3.1.
% Encoding: ANSI_X3.4-1968
-@article{ccg15:ij,
+@inproceedings{mansingka2013fibonacci,
+ title={Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System},
+ author={Mansingka, Abhinav S and Barakat, Mohamed L and Zidan, M Affan and Radwan, Ahmed G and Salama, Khaled N},
+ booktitle={IT Convergence and Security (ICITCS), 2013 International Conference on},
+ pages={1--4},
+ year={2013},
+ organization={IEEE}}
+
+
+@article{Rossler1976397,
+title = "An equation for continuous chaos",
+journal = "Physics Letters A",
+volume = "57",
+number = "5",
+pages = "397 - 398",
+year = "1976",
+note = "",
+issn = "0375-9601",
+doi = "http://dx.doi.org/10.1016/0375-9601(76)90101-8",
+url = "http://www.sciencedirect.com/science/article/pii/0375960176901018",
+author = "O.E. Rössler",
+
+}
+
+
+@INPROCEEDINGS{6868789,
+author={Dabal, Pawel and Pelka, Ryszard},
+booktitle={Design and Diagnostics of Electronic Circuits Systems, 17th International Symposium on},
+title={A study on fast pipelined pseudo-random number generator based on chaotic logistic map},
+year={2014},
+month={April},
+pages={195-200},
+keywords={chaotic systems;logistic map;pseudo-random bit generator;system-on-chip},
+doi={10.1109/DDECS.2014.6868789},}
+
+
+ @article{may1976simple,
+ title={Simple mathematical models with very complicated dynamics},
+ author={May, Robert M and others},
+ journal={Nature},
+ volume={261},
+ number={5560},
+ pages={459--467},
+ year={1976},
+ publisher={London}}
+
+@article{Silva:2009:LLP:1592409.1592411,
+ author = {Silva, Rui Miguel and Crespo, Rui Gustavo and Nunes, Mario Serafim},
+ title = {LoBa128, a Lorenz\&\#45;Based PRNG for Wireless Sensor Networks},
+ journal = {Int. J. Commun. Netw. Distrib. Syst.},
+ issue_date = {August 2009},
+ volume = {3},
+ number = {4},
+ month = aug,
+ year = {2009},
+ issn = {1754-3916},
+ pages = {301--318},
+ numpages = {18},
+ url = {http://dx.doi.org/10.1504/IJCNDS.2009.027596},
+ doi = {10.1504/IJCNDS.2009.027596},
+ acmid = {1592411},
+ publisher = {Inderscience Publishers},
+ address = {Inderscience Publishers, Geneva, SWITZERLAND},
+ keywords = {PRNG, WSN, chaos cryptography, key management, pseudo\&\#45;random number generator, statistical attacks, symmetrical encryption, wireless networks, wireless sensor networks},
+}
+
+@ARTICLE{Lorenz1963,
+ author = {{Lorenz}, E.~N.},
+ title = "{Deterministic Nonperiodic Flow.}",
+ journal = {Journal of Atmospheric Sciences},
+ year = 1963,
+ month = mar,
+ volume = 20,
+ pages = {130-148},
+ doi = {10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2},
+ adsurl = {http://adsabs.harvard.edu/abs/1963JAtS...20..130L},
+ adsnote = {Provided by the SAO/NASA Astrophysics Data System}
+}
+
+
+
+@inproceedings{mao2006design,
+ title={Design and FPGA implementation of a pseudo-random bit sequence generator using spatiotemporal chaos},
+ author={Mao, Yaobin and Cao, Liu and Liu, Wenbo},
+ booktitle={Communications, Circuits and Systems Proceedings, 2006 International Conference on},
+ volume={3},
+ pages={2114--2118},
+ year={2006},
+ organization={IEEE}}
+
+
+@article{merahcoupling13,
+ title={Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System-Study and Real Time FPGA Implementation},
+ author={Merah, Lahcene and ALI-PACHA, Adda and SAID, Naima HADJ},
+ year=2013,
+ month=oct,
+ volume=4,
+ issue=10,
+ journal={International Journal of Computer Science and Telecommunications}
+ }
+
+
+@article{henon1976two,
+ title={A two-dimensional mapping with a strange attractor},
+ author={H{\'e}non, Michel},
+ journal={Communications in Mathematical Physics},
+ volume={50},
+ number={1},
+ pages={69--77},
+ year={1976},
+ publisher={Springer}}
+
+ @inproceedings{liu2008improved,
+ title={An improved chaos-based stream cipher algorithm and its VLSI implementation},
+ author={Liu, Shubo and Sun, Jing and Xu, Zhengquan and Cai, Zhaohui},
+ booktitle={Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on},
+ volume={2},
+ pages={191--197},
+ year={2008},
+ organization={IEEE}}
+
+
+@inproceedings{dabal2012fpga,
+ title={FPGA implementation of chaotic pseudo-random bit generators},
+ author={Dabal, Pawel and Pelka, Ryszard},
+ booktitle={Mixed Design of Integrated Circuits and Systems (MIXDES), 2012 Proceedings of the 19th International Conference},
+ pages={260--264},
+ year={2012},
+ organization={IEEE}}
+
+@inproceedings{dabal2011chaos,
+ title={A chaos-based pseudo-random bit generator implemented in FPGA device},
+ author={Dabal, Pawel and Pelka, Ryszard},
+ booktitle={Design and Diagnostics of Electronic Circuits \& Systems (DDECS), 2011 IEEE 14th International Symposium on},
+ pages={151--154},
+ year={2011},
+ organization={IEEE}}
+
+
+@book{wiggins2003introduction,
+ title={Introduction to applied nonlinear dynamical systems and chaos},
+ author={Wiggins, Stephen},
+ volume={2},
+ year={2003},
+ publisher={Springer Science \& Business Media}
+}
+
+@inproceedings{aagc+15:ip,
+ author = {Bassam AlKindy and
+ Bashar Al{-}Nuaimi and
+ Christophe Guyeux and
+ Jean{-}Fran{\c{c}}ois Couchot and
+ Michel Salomon and
+ Reem Alsrraj and
+ Laurent Philippe},
+ title = {Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm
+ for Inferring Well Supported Phylogenetic Trees},
+ booktitle = {Computational Intelligence Methods for Bioinformatics and Biostatistics
+ - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
+ 10-12, 2015, Revised Selected Papers},
+ pages = {165--179},
+ year = {2015},
+ crossref = {DBLP:conf/cibb/2015},
+ url = {http://dx.doi.org/10.1007/978-3-319-44332-4_13},
+ doi = {10.1007/978-3-319-44332-4_13},
+ timestamp = {Tue, 02 Aug 2016 16:01:45 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/AlKindyAGCSAP15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@proceedings{DBLP:conf/cibb/2015,
+ editor = {Claudia Angelini and
+ Paola M. V. Rancoita and
+ Stefano Rovetta},
+ title = {Computational Intelligence Methods for Bioinformatics and Biostatistics
+ - 12th International Meeting, {CIBB} 2015, Naples, Italy, September
+ 10-12, 2015, Revised Selected Papers},
+ series = {Lecture Notes in Computer Science},
+ volume = {9874},
+ publisher = {Springer},
+ year = {2016},
+ url = {http://dx.doi.org/10.1007/978-3-319-44332-4},
+ doi = {10.1007/978-3-319-44332-4},
+ isbn = {978-3-319-44331-7},
+ timestamp = {Tue, 02 Aug 2016 16:01:14 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/2015},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+
+
+@inproceedings{DBLP:conf/apsipa/TanL14,
+ author = {Shunquan Tan and
+ Bin Li},
+ title = {Stacked convolutional auto-encoders for steganalysis of digital images},
+ booktitle = {Asia-Pacific Signal and Information Processing Association Annual
+ Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
+ 9-12, 2014},
+ pages = {1--4},
+ year = {2014},
+ crossref = {DBLP:conf/apsipa/2014},
+ url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565},
+ doi = {10.1109/APSIPA.2014.7041565},
+ timestamp = {Sat, 14 Mar 2015 17:34:07 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+@proceedings{DBLP:conf/apsipa/2014,
+ title = {Asia-Pacific Signal and Information Processing Association Annual
+ Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
+ 9-12, 2014},
+ publisher = {{IEEE}},
+ year = {2014},
+ url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284},
+ isbn = {978-6-1636-1823-8},
+ timestamp = {Sat, 14 Mar 2015 15:24:04 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@inproceeding{doi:10.1117/12.2083479,
+author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu},
+title = {
+Deep learning for steganalysis via convolutional neural networks
+},
+journal = {Proc. SPIE},
+volume = {9409},
+number = {},
+pages = {94090J-94090J-10},
+abstract = {
+Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
+},
+year = {2015},
+doi = {10.1117/12.2083479},
+URL = { http://dx.doi.org/10.1117/12.2083479},
+eprint = {}
+}
+
+
+
+@inproceedings{DBLP:conf/ijcai/CiresanMMGS11,
+ author = {Dan Claudiu Ciresan and
+ Ueli Meier and
+ Jonathan Masci and
+ Luca Maria Gambardella and
+ J{\"{u}}rgen Schmidhuber},
+ title = {Flexible, High Performance Convolutional Neural Networks for Image
+ Classification},
+ booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
+ on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
+ 2011},
+ pages = {1237--1242},
+ year = {2011},
+ crossref = {DBLP:conf/ijcai/2011},
+ url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf},
+ timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@proceedings{DBLP:conf/ijcai/2011,
+ editor = {Toby Walsh},
+ title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
+ on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
+ 2011},
+ publisher = {{IJCAI/AAAI}},
+ year = {2011},
+ isbn = {978-1-57735-516-8},
+ timestamp = {Tue, 09 Aug 2011 14:09:58 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@article{DBLP:journals/ftsig/DengY14,
+ author = {Li Deng and
+ Dong Yu},
+ title = {Deep Learning: Methods and Applications},
+ journal = {Foundations and Trends in Signal Processing},
+ volume = {7},
+ number = {3-4},
+ pages = {197--387},
+ year = {2014},
+ url = {http://dx.doi.org/10.1561/2000000039},
+ doi = {10.1561/2000000039},
+ timestamp = {Tue, 08 Jul 2014 15:28:41 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@article{BDCC16,
+author="Bitar, Ahmad W.
+and Darazi, Rony
+and Couchot, Jean-Fran{\c{c}}ois
+and Couturier, Rapha{\"e}l",
+title="Blind digital watermarking in PDF documents using Spread Transform Dither Modulation",
+year="2015",
+pages="1--19",
+abstract="In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.",
+issn="1573-7721",
+doi="10.1007/s11042-015-3034-2",
+url="http://dx.doi.org/10.1007/s11042-015-3034-2",
+journal={Multimedia Tools and Applications},
+publisher={Springer US},
+}
+
+
+
+@inproceedings{CW99,
+author = {Chen, Brian and Wornell, Gregory W.},
+title = {Provably robust digital watermarking},
+journal = {Proc. SPIE},
+volume = {3845},
+number = {},
+pages = {43-54},
+year = {1999},
+doi = {10.1117/12.371232},
+URL = { http://dx.doi.org/10.1117/12.371232},
+eprint = {}
+}
+
+@INPROCEEDINGS{DM10,
+author={Darazi, R. and Hu, R. and Macq, B.},
+booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
+title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
+year={2010},
+pages={1742-1745},
+keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
+doi={10.1109/ICASSP.2010.5495455},
+ISSN={1520-6149},
+month={March},}
+
+@INPROCEEDINGS{WLSYNW13,
+author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
+booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
+title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
+year={2013},
+pages={4522-4526},
+keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
+doi={10.1109/ICIP.2013.6738931},
+month={Sept},}
+
+
+@article{CW01,
+year={2001},
+issn={0922-5773},
+journal={Journal of VLSI signal processing systems for signal, image and video technology},
+volume={27},
+number={1-2},
+title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
+publisher={Kluwer Academic Publishers},
+keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
+author={Chen, Brian and Wornell, Gregory W.},
+pages={7--33}
+}
+
+@InProceedings{WT08,
+ author = {Wang, C. T. and Tsai, W. H. },
+ title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
+ OPTcrossref = {},
+ OPTkey = {},
+ booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ pages = {1--6},
+ OPTmonth = {},
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/sigpro/LeeT10,
+ author = {I{-}Shi Lee and
+ Wen{-}Hsiang Tsai},
+ title = {A new approach to covert communication via {PDF} files},
+ journal = {Signal Processing},
+ volume = {90},
+ number = {2},
+ pages = {557--565},
+ year = {2010},
+ url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
+ doi = {10.1016/j.sigpro.2009.07.022},
+ timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@Article{LLGC13,
+ author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
+ title = {A Copyright Protection Scheme Based on PDF},
+ journal = {International Journal of Innovative Computing, Information and Control},
+ year = {2013},
+ OPTkey = {},
+ volume = {9},
+ number = {1},
+ pages = {1--6},
+ OPTmonth = {},
+ note = {ISSN 1349-4198},
+ OPTannote = {}
+}
+
+@Misc{ACDV12,
+ author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
+ title = {Using Steganography to hide messages inside PDF files},
+ howpublished = {SSN Project Report},
+ month = dec,
+ year = {2012},
+ OPTnote = {34p,}
+}
+
+@InProceedings{PD2008,
+ author = {POR, L. Y. and Delina, B.},
+ title = {Information Hiding: A New Approach in Text Steganography},
+ booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTpages = {},
+ month = apr,
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/tifs/PevnyBF10,
+ author = {Tom{\'{a}}s Pevn{\'{y}} and
+ Patrick Bas and
+ Jessica J. Fridrich},
+ title = {Steganalysis by subtractive pixel adjacency matrix},
+ journal = {{IEEE} Transactions on Information Forensics and Security},
+ volume = {5},
+ number = {2},
+ pages = {215--224},
+ year = {2010},
+ url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
+ doi = {10.1109/TIFS.2010.2045842},
+ timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@INPROCEEDINGS{rifq/others03,
+ author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4425},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of resemblance},
+ booktitle = {{IFSA}'03},
+ year = {2003},
+ location = {Istanbul, Turkey}
+}
+
+
+@ARTICLE{Rifqi:2000:DPM:342947.342970,
+ author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4417},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of comparison},
+ journal = {{F}uzzy {S}ets and {S}ystems},
+ volume = {110},
+ year = {2000},
+ pages = {189-196}
+}
+
+
+
+@book{Anderberg-Cluster-1973,
+ added-at = {2008-10-29T00:31:48.000+0100},
+ author = {Anderberg, M. R.},
+ biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
+ interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
+ intrahash = {f586cc49441c591f06539d11d3e06006},
+ keywords = {cluster_analysis wismasys0809},
+ publisher = {Academic Press},
+ timestamp = {2008-10-29T00:31:48.000+0100},
+ title = {Cluster Analysis for Applications},
+ year = 1973
+}
+
+
+
+@article{yule1950introduction,
+ Author = {Yule, G.U. and Kendall, MG},
+ Date-Added = {2009-08-14 22:16:50 -0500},
+ Date-Modified = {2009-08-14 22:16:50 -0500},
+ Journal = {Statistics},
+ Title = {An Introduction to the Theory of},
+ Year = {1950}}
+
+
+@inproceedings{fgb11:ip,
inhal = {no},
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
equipe = {and},
-classement = {ACLI},
+classement = {ACTI},
+author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
+title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
+booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
+pages = {218--227},
+address = {Sevilla, Spain},
+editor = {Javier Lopez and Pierangela Samarati},
+publisher = {SciTePress},
+month = jul,
+year = 2011,
+
+}
+
+
+@ARTICLE{Cayre2008,
+ author = {Cayre, F. and Bas, P.},
+ title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
+ journal = {IEEE Transactions on Information Forensics and Security},
+ year = {2008},
+ volume = {3},
+ pages = {1--15},
+ number = {1},
+ doi = {10.1109/TIFS.2007.916006},
+ issn = {1556-6013},
+ keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
+ security, watermarking, Kerckhoffs-based embedding security classes,
+ WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
+ steganography security, watermark-only-attack, watermarking, Security,
+ spread-spectrum (SS) watermarking},
+ owner = {guyeux},
+ timestamp = {2009.06.29}
+}
+@INPROCEEDINGS{Perez06,
+ author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
+ title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
+ Approach},
+ booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
+ year = {2006},
+ volume =6072,
+ pages={1--12},
+ month = jan,
+ publisher = spie,
+ address = spie_loc
+}
+
+
+
+@ARTICLE{Cayre2005,
+ author = {Cayre, F. and Fontaine, C. and Furon, T.},
+ title = {Watermarking security: theory and practice},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2005},
+ volume = {53},
+ pages = {3976--3987},
+ number = {10},
+ keywords = {blind source separation, cryptography, watermarking, Fisher information
+ matrix, blind source separation, cryptanalysis, information theory,
+ spread spectrum techniques, substitutive scheme, watermarking security,
+ Blind source separation, Fisher information matrix, equivocation,
+ security, watermarking}
+}
+
+
+
+@inproceedings{Shujun1,
+ author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
+ title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
+ Their Roles in Cryptography and Pseudo-Random Coding},
+ booktitle = {Cryptography and Coding, 8th IMA International Conference,
+ Cirencester, UK},
+ month=dec,
+ year = 2001,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
+ volume = {2260},
+ pages = {205--221}}
+
+
+@misc{cgh16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
+title = {Random Walk in a N-cube Without Hamiltonian Cycle
+ to Chaotic Pseudorandom Number Generation: Theoretical and Practical
+ Considerations},
+howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
+month = mar,
+year = 2015,
+}
+
+
+@misc{bgco16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
+title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
+howpublished = {in submission to the ACM Computing Surveys journal},
+month = aug,
+year = 2015,
+}
+
+
+
+
+
+
+@inproceedings{couchot04:onp,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois},
+title = {V\'erification d'invariant par superposition},
+booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
+address = {Calais, France},
+ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
+url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
+note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
+abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
+month = oct,
+year = 2004,
+
+}
+
+
+
+
+@inproceedings{aangc+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
+booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
+pages = {379--390},
+doi = {10.1007/978-3-319-16483-0_38},
+url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
+series = {LNCS},
+volume = 9043,
+address = {Granada, Spain},
+month = apr,
+year = 2015,
+}
+
+
+
+
+
+
+
+@inproceedings{agcs+15:ip,
+ author = {Bassam AlKindy and
+ Christophe Guyeux and
+ Jean{-}Fran{\c{c}}ois Couchot and
+ Michel Salomon and
+ Christian Parisod and
+ Jacques M. Bahi},
+ title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well
+ Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core
+ Genes},
+ booktitle = {Algorithms for Computational Biology - Second International Conference,
+ AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
+ pages = {83--96},
+ year = {2015},
+ crossref = {DBLP:conf/alcob/2015},
+ url = {http://dx.doi.org/10.1007/978-3-319-21233-3_7},
+ doi = {10.1007/978-3-319-21233-3_7},
+ timestamp = {Tue, 28 Jul 2015 14:46:16 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/AlKindyGCSPB15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@proceedings{DBLP:conf/alcob/2015,
+ editor = {Adrian Horia Dediu and
+ Francisco Hern{\'{a}}ndez Quiroz and
+ Carlos Mart{\'{\i}}n{-}Vide and
+ David A. Rosenblueth},
+ title = {Algorithms for Computational Biology - Second International Conference,
+ AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {9199},
+ publisher = {Springer},
+ year = {2015},
+ url = {http://dx.doi.org/10.1007/978-3-319-21233-3},
+ doi = {10.1007/978-3-319-21233-3},
+ isbn = {978-3-319-21232-6},
+ timestamp = {Tue, 28 Jul 2015 14:45:41 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/2015},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+
+
+
+@inproceedings{bcg11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
+booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+pages = {52--57},
+address = {Luxembourg, Luxembourg},
+month = jun,
+year = 2011,
+note = {Best paper award},
+
+}
+
+@article{bcg12:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLNI},
impact-factor ={#},
isi-acro = {#},
-author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
-title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
-journal = {Annals of Telecommunications},
-doi = {10.1007/s12243-015-0466-7},
-url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
-publisher = {Springer},
-year = 2015,
-note = {Available online. Paper version to appear},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Quality analysis of a chaotic proven keyed hash function},
+journal = {International Journal On Advances in Internet Technology},
+pages = {26--33},
+volume = 5,
+number = 1,
+publisher = {IARIA},
+year = 2012,
}
+
+@article{ccg15:ij,
+ author = {Jean{-}Fran{\c{c}}ois Couchot and
+ Rapha{\"{e}}l Couturier and
+ Christophe Guyeux},
+ title = {{STABYLO:} steganography with adaptive, Bbs, and binary embedding
+ at low cost},
+ journal = {Annales des T{\'{e}}l{\'{e}}communications},
+ volume = {70},
+ number = {9-10},
+ pages = {441--449},
+ year = {2015},
+ url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
+ doi = {10.1007/s12243-015-0466-7},
+ timestamp = {Mon, 28 Sep 2015 12:42:01 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/adt/CouchotCG15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+ }
+
@inproceedings{fccg15:ip,
inhal = {no},
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
title = {Steganalyzer performances in operational contexts},
booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
-pages = {***--***},
+pages = {429-432},
address = {Adelaide, Australia},
month = sep,
-year = 2015,
-note = {To appear},
+year = 2015
+}
+
+@inproceedings{accfg15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux},
+title = {Performance Study of Steganalysis Techniques},
+booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on},
+pages = {1--7},
+address = {Lebanon},
+month = oct,
+year = 2015
}
+
@inproceedings{bcfg12a:ip,
inhal = {no},
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
}
+
+
+
@inproceedings{bcfg+13:ip,
inhal = {no},
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
day = 23,
month = sep,
year = 2014,
+}
+
+
+
+
+
+@inproceedings{aagp+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTIN},
+author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
+title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
+booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
+pages = {***--***},
+address = {Naples, Italy},
+day = 10,
+month = sep,
+year = 2015,
+note = {To appear},
}
-@InProceedings{,
- author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
-Michel Salomon, Jacques M Bahi},
- title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
- OPTcrossref = {},
- OPTkey = {},
- booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
- OPTyear = {2014},
- OPTeditor = {},
- OPTvolume = {},
- OPTnumber = {},
- OPTseries = {},
- pages = {***--***},
- month = nov,
- address = {Belfast, UK},
- OPTorganization = {},
- publisher = {IEE },
- note = {To appear},
- OPTannote = {}
+@inproceedings{acgm+14:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
+title = {Finding the Core-Genes of Chloroplasts},
+booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
+pages = {357--364},
+series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
+number = {4(5)},
+doi = {10.7763/IJBBB.2014.V4.371},
+url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
+address = {Copenhagen, Denmark},
+day = 18,
+month = jun,
+year = 2014,
+
}
+
+@inproceedings{akgcs+14:oip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
+booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
+address = {Belfast, United Kingdom},
+day = 2,
+month = nov,
+year = 2014,
+note = {Short paper},
+}
+
+@misc{acgs13:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
+title = {Finding the core-genes of Chloroplast Species},
+howpublished = {Journ\'ees SeqBio 2013, Montpellier},
+month = nov,
+year = 2013,
+
+}
+
+
+
+
+
@PhdThesis{guyeuxphd,
author = {Guyeux, Christophe},
title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
year = 2014
}
+@inproceedings{ccfg16:ip,
+author = {Couchot, Jean-Fran\c{c}ois and
+ Couturier, Rapha\"el and Fadil, Yousra Ahmed and Guyeux, Christophe},
+title = {A Second Order Derivatives based Approach for Steganography},
+booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
+pages = {424-431},
+address = {Lisbon},
+month = jul,
+year = 2016
+}
+
+
Pages = "53--65"
}
+@inproceedings{cg04:np,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
+title = {Analyse d'atteignabilit\'e d\'eductive},
+booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
+pages = {269--283},
+editor = {Julliand, Jacques},
+address = {Besan\c{c}on, France},
+month = jun,
+year = 2004,
+
+}
+
+
+@article{cdgr03:ij,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
+journal = {Journal of the Brazilian Computer Society (JBCS)},
+volume = 9,
+number = 2,
+pages = {17--36},
+url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
+month = nov,
+year = 2003,
+note = {ISSN 0104-6500},
+
+}
+
+
+@inproceedings{cddg+04:ip,
+inhal = {no},
+domainehal = {INFO:INFO_SE, INFO:INFO_MO},
+equipe = {vesontio},
+author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {Proving and Debugging Set-Based Specifications},
+booktitle = {WMF'03 proceedings},
+series = {ENTCS, Electronic Notes in Theoretical Computer Science},
+volume = 95,
+pages = {189--208},
+editor = {A. Cavalcanti and P. Machado},
+address = {Campina Grande, Brazil},
+url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
+month = may,
+year = 2004,
+
+}
+
+
+@inproceedings{cdgr04:onp,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
+title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
+pages = {369--372},
+booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
+address = {Besan\c{c}on, France},
+month = jun,
+year = 2004,
+editor = {Julliand, Jacques},
+note = {Session outils},
+
+}
+
+
@INPROCEEDINGS{CGK05,
author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
title = {A uniform deductive approach for parameterized protocol safety},
publisher = {Elsevier},
month = oct,
year = 2013,
-note = {Available online. Paper version to appear},
+note = {Available online.}
}
language={English}
}
+
+
+
+
@inproceedings{conf/wifs/HolubF12,
added-at = {2013-01-23T00:00:00.000+0100},
author = {Holub, Vojtech and Fridrich, Jessica J.},
year = 2012
}
-
+@proceedings{conf/wifs/2012,
+ title = {2012 {IEEE} International Workshop on Information Forensics and Security,
+ {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
+ publisher = {{IEEE}},
+ year = {2012},
+ url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
+ isbn = {978-1-4673-2285-0},
+ timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
@article{FillerJF11,
OPTannote = {}
}
+@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
+ author = {Jan Kodovský and
+ Tomás Pevný and
+ Jessica J. Fridrich},
+ title = {Modern steganalysis can detect YASS.},
+ booktitle = {Media Forensics and Security},
+ year = {2010},
+ pages = {754102},
+ ee = {http://dx.doi.org/10.1117/12.838768}
+}
+
@article{DBLP:journals/tifs/KodovskyFH12,
author = {Jan Kodovsk{\'y} and
Jessica J. Fridrich and
+
+@InProceedings{kcm16:ip,
+ author = {N. Khernane, J.-F. Couchot, A. Mostefaoui},
+ title = {Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints},
+ OPTcrossref = {},
+ OPTkey = {},
+ booktitle = {MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access},
+ year = {2016},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTpages = {},
+ month = nov,
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
@article{MCErlang07,
- author = {Fredlund, Lars-\AAke and Svensson, Hans},
+ author = {Fredlund, Lars-Ake and Svensson, Hans},
title = {McErlang: a model checker for a distributed functional programming language},
journal = {SIGPLAN Not.},
volume = {42},
year = 2014,
}
+@article{Robinson:1981:CS,
+ author = {Robinson, John P. and Cohn, Martin},
+ title = {Counting Sequences},
+ journal = {IEEE Trans. Comput.},
+ issue_date = {January 1981},
+ volume = {30},
+ number = {1},
+ month = jan,
+ year = {1981},
+ issn = {0018-9340},
+ pages = {17--23},
+ numpages = {7},
+ url = {http://dl.acm.org/citation.cfm?id=1963620.1963622},
+ acmid = {1963622},
+ publisher = {IEEE Computer Society},
+ address = {Washington, DC, USA},
+ keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance},
+}
+@article{DBLP:journals/combinatorics/BhatS96,
+ author = {Girish S. Bhat and
+ Carla D. Savage},
+ title = {Balanced Gray Codes},
+ journal = {Electr. J. Comb.},
+ volume = {3},
+ number = {1},
+ year = {1996},
+ url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html},
+ timestamp = {Tue, 05 Oct 2004 14:51:02 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+
+@inproceedings{DBLP:conf/secrypt/MohammedCG16,
+ author = {Bakiri Mohammed and
+ Jean{-}Fran{\c{c}}ois Couchot and
+ Christophe Guyeux},
+ title = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators
+ based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study},
+ booktitle = {Proceedings of the 13th International Joint Conference on e-Business
+ and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
+ Portugal, July 26-28, 2016.},
+ pages = {302--309},
+ year = {2016},
+ crossref = {DBLP:conf/secrypt/2016},
+ url = {http://dx.doi.org/10.5220/0005967903020309},
+ doi = {10.5220/0005967903020309},
+ timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/MohammedCG16},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@proceedings{DBLP:conf/secrypt/2016,
+ editor = {Christian Callegari and
+ Marten van Sinderen and
+ Panagiotis G. Sarigiannidis and
+ Pierangela Samarati and
+ Enrique Cabello and
+ Pascal Lorenz and
+ Mohammad S. Obaidat},
+ title = {Proceedings of the 13th International Joint Conference on e-Business
+ and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
+ Portugal, July 26-28, 2016},
+ publisher = {SciTePress},
+ year = {2016},
+ isbn = {978-989-758-196-0},
+ timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2016},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@article{ccgh16,
+author = {Couchot, Jean-Fran\c{c}ois and Contassot-Vivier, Sylvain and
+H\'eam, Pierre-Cyrille and Guyeux, Christophe},
+title = {Random Walk in a N-cube Without Hamiltonian Cycle
+ to Chaotic Pseudorandom Number Generation: Theoretical and Practical
+ Considerations},
+journal = {International Journal of Bifurcation and Chaos},
+note={Accepted on Oct 2016},
+year = 2016
+}
+
+
+@article{Khan2014251,
+title = "A recent survey of reversible watermarking techniques ",
+journal = "Information Sciences ",
+volume = "279",
+number = "",
+pages = "251 - 272",
+year = "2014",
+note = "",
+issn = "0020-0255",
+doi = "http://dx.doi.org/10.1016/j.ins.2014.03.118",
+url = "http://www.sciencedirect.com/science/article/pii/S0020025514004150",
+author = "Asifullah Khan and Ayesha Siddiqa and Summuyya Munib and Sana Ambreen Malik",
+keywords = "Information hiding",
+keywords = "Histogram processing",
+keywords = "Reversible watermarking",
+keywords = "Error expansion",
+keywords = "Quantization",
+keywords = "Prediction error ",
+abstract = "Abstract The art of secretly hiding and communicating information has gained immense importance in the last two decades due to the advances in generation, storage, and communication technology of digital content. Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, watermarking can cause damage to the sensitive information present in the cover work. Therefore, at the receiving end, the exact recovery of cover work may not be possible. Additionally, there exist certain applications that may not tolerate even small distortions in cover work prior to the downstream processing. In such applications, reversible watermarking instead of conventional watermarking is employed. Reversible watermarking of digital content allows full extraction of the watermark along with the complete restoration of the cover work. For the last few years, reversible watermarking techniques are gaining popularity because of its increasing applications in some important and sensitive areas, i.e., military communication, healthcare, and law-enforcement. Due to the rapid evolution of reversible watermarking techniques, a latest review of recent research in this field is highly desirable. In this survey, the performances of different reversible watermarking schemes are discussed on the basis of various characteristics of watermarking. However, the major focus of this survey is on prediction-error expansion based reversible watermarking techniques, whereby the secret information is hidden in the prediction domain through error expansion. Comparison of the different reversible watermarking techniques is provided in tabular form, and an analysis is carried out. Additionally, experimental comparison of some of the recent reversible watermarking techniques, both in terms of watermarking properties and computational time, is provided on a dataset of 300 images. Future directions are also provided for this potentially important field of watermarking. "
+}