% Encoding: ANSI_X3.4-1968
+@article{BDCC16,
+year={2015},
+journal={Multimedia Tools and Applications},
+title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.},
+publisher={Springer US},
+author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and
+Couturier, Raphaël},
+note={to appear},
+}
+
+
+
+@inproceedings{CW99,
+author = {Chen, Brian and Wornell, Gregory W.},
+title = {Provably robust digital watermarking},
+journal = {Proc. SPIE},
+volume = {3845},
+number = {},
+pages = {43-54},
+year = {1999},
+doi = {10.1117/12.371232},
+URL = { http://dx.doi.org/10.1117/12.371232},
+eprint = {}
+}
+
+@INPROCEEDINGS{DM10,
+author={Darazi, R. and Hu, R. and Macq, B.},
+booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on},
+title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models},
+year={2010},
+pages={1742-1745},
+keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking},
+doi={10.1109/ICASSP.2010.5495455},
+ISSN={1520-6149},
+month={March},}
+
+@INPROCEEDINGS{WLSYNW13,
+author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng },
+booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on},
+title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model},
+year={2013},
+pages={4522-4526},
+keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model},
+doi={10.1109/ICIP.2013.6738931},
+month={Sept},}
+
+
+@article{CW01,
+year={2001},
+issn={0922-5773},
+journal={Journal of VLSI signal processing systems for signal, image and video technology},
+volume={27},
+number={1-2},
+title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia},
+publisher={Kluwer Academic Publishers},
+keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation},
+author={Chen, Brian and Wornell, Gregory W.},
+pages={7--33}
+}
+
+@InProceedings{WT08,
+ author = {Wang, C. T. and Tsai, W. H. },
+ title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters},
+ OPTcrossref = {},
+ OPTkey = {},
+ booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ pages = {1--6},
+ OPTmonth = {},
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/sigpro/LeeT10,
+ author = {I{-}Shi Lee and
+ Wen{-}Hsiang Tsai},
+ title = {A new approach to covert communication via {PDF} files},
+ journal = {Signal Processing},
+ volume = {90},
+ number = {2},
+ pages = {557--565},
+ year = {2010},
+ url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
+ doi = {10.1016/j.sigpro.2009.07.022},
+ timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@Article{LLGC13,
+ author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
+ title = {A Copyright Protection Scheme Based on PDF},
+ journal = {International Journal of Innovative Computing, Information and Control},
+ year = {2013},
+ OPTkey = {},
+ volume = {9},
+ number = {1},
+ pages = {1--6},
+ OPTmonth = {},
+ note = {ISSN 1349-4198},
+ OPTannote = {}
+}
+
+@Misc{ACDV12,
+ author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
+ title = {Using Steganography to hide messages inside PDF files},
+ howpublished = {SSN Project Report},
+ month = dec,
+ year = {2012},
+ OPTnote = {34p,}
+}
+
+@InProceedings{PD2008,
+ author = {POR, L. Y. and Delina, B.},
+ title = {Information Hiding: A New Approach in Text Steganography},
+ booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTpages = {},
+ month = apr,
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/tifs/PevnyBF10,
+ author = {Tom{\'{a}}s Pevn{\'{y}} and
+ Patrick Bas and
+ Jessica J. Fridrich},
+ title = {Steganalysis by subtractive pixel adjacency matrix},
+ journal = {{IEEE} Transactions on Information Forensics and Security},
+ volume = {5},
+ number = {2},
+ pages = {215--224},
+ year = {2010},
+ url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
+ doi = {10.1109/TIFS.2010.2045842},
+ timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@INPROCEEDINGS{rifq/others03,
+ author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4425},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of resemblance},
+ booktitle = {{IFSA}'03},
+ year = {2003},
+ location = {Istanbul, Turkey}
+}
+
+
+@ARTICLE{Rifqi:2000:DPM:342947.342970,
+ author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4417},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of comparison},
+ journal = {{F}uzzy {S}ets and {S}ystems},
+ volume = {110},
+ year = {2000},
+ pages = {189-196}
+}
+
+
+
+@book{Anderberg-Cluster-1973,
+ added-at = {2008-10-29T00:31:48.000+0100},
+ author = {Anderberg, M. R.},
+ biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
+ interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
+ intrahash = {f586cc49441c591f06539d11d3e06006},
+ keywords = {cluster_analysis wismasys0809},
+ publisher = {Academic Press},
+ timestamp = {2008-10-29T00:31:48.000+0100},
+ title = {Cluster Analysis for Applications},
+ year = 1973
+}
+
+
+
+@article{yule1950introduction,
+ Author = {Yule, G.U. and Kendall, MG},
+ Date-Added = {2009-08-14 22:16:50 -0500},
+ Date-Modified = {2009-08-14 22:16:50 -0500},
+ Journal = {Statistics},
+ Title = {An Introduction to the Theory of},
+ Year = {1950}}
+
+
+@inproceedings{fgb11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
+title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
+booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
+pages = {218--227},
+address = {Sevilla, Spain},
+editor = {Javier Lopez and Pierangela Samarati},
+publisher = {SciTePress},
+month = jul,
+year = 2011,
+
+}
+
+
+@ARTICLE{Cayre2008,
+ author = {Cayre, F. and Bas, P.},
+ title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
+ journal = {IEEE Transactions on Information Forensics and Security},
+ year = {2008},
+ volume = {3},
+ pages = {1--15},
+ number = {1},
+ doi = {10.1109/TIFS.2007.916006},
+ issn = {1556-6013},
+ keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
+ security, watermarking, Kerckhoffs-based embedding security classes,
+ WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
+ steganography security, watermark-only-attack, watermarking, Security,
+ spread-spectrum (SS) watermarking},
+ owner = {guyeux},
+ timestamp = {2009.06.29}
+}
+@INPROCEEDINGS{Perez06,
+ author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
+ title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
+ Approach},
+ booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
+ year = {2006},
+ volume =6072,
+ pages={1--12},
+ month = jan,
+ publisher = spie,
+ address = spie_loc
+}
+
+
+
+@ARTICLE{Cayre2005,
+ author = {Cayre, F. and Fontaine, C. and Furon, T.},
+ title = {Watermarking security: theory and practice},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2005},
+ volume = {53},
+ pages = {3976--3987},
+ number = {10},
+ keywords = {blind source separation, cryptography, watermarking, Fisher information
+ matrix, blind source separation, cryptanalysis, information theory,
+ spread spectrum techniques, substitutive scheme, watermarking security,
+ Blind source separation, Fisher information matrix, equivocation,
+ security, watermarking}
+}
+
+
+
+@inproceedings{Shujun1,
+ author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
+ title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
+ Their Roles in Cryptography and Pseudo-Random Coding},
+ booktitle = {Cryptography and Coding, 8th IMA International Conference,
+ Cirencester, UK},
+ month=dec,
+ year = 2001,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
+ volume = {2260},
+ pages = {205--221}}
+
+
+@misc{cgh16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
+title = {Random Walk in a N-cube Without Hamiltonian Cycle
+ to Chaotic Pseudorandom Number Generation: Theoretical and Practical
+ Considerations},
+howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
+month = mar,
+year = 2015,
+}
+
+
+@misc{bgco16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
+title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
+howpublished = {in submission to the ACM Computing Surveys journal},
+month = aug,
+year = 2015,
+}
+
+@misc{bdcc15:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {
+Bitar, Ahmad and
+Darazi, Rony and
+Couchot, Jean-Fran{\c}cois and
+Couturier, Rapha\¨el},
+title = {Blind digital watermarking in PDF documents using
+Spread Transform Dither Modulation},
+howpublished = {in submission to the Multimedia Tools and Applications journal},
+month = dec,
+year = 2014
+}
+
+
+
+
@inproceedings{couchot04:onp,
inhal = {no},
year = 2014,
}
+
+
+
+
@inproceedings{aagp+15:ip,
inhal = {no},
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
language={English}
}
+
+
+
+
@inproceedings{conf/wifs/HolubF12,
added-at = {2013-01-23T00:00:00.000+0100},
author = {Holub, Vojtech and Fridrich, Jessica J.},
year = 2012
}
-
+@proceedings{conf/wifs/2012,
+ title = {2012 {IEEE} International Workshop on Information Forensics and Security,
+ {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
+ publisher = {{IEEE}},
+ year = {2012},
+ url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850},
+ isbn = {978-1-4673-2285-0},
+ timestamp = {Wed, 23 Jan 2013 20:32:42 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
@article{FillerJF11,
OPTannote = {}
}
+@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
+ author = {Jan Kodovský and
+ Tomás Pevný and
+ Jessica J. Fridrich},
+ title = {Modern steganalysis can detect YASS.},
+ booktitle = {Media Forensics and Security},
+ year = {2010},
+ pages = {754102},
+ ee = {http://dx.doi.org/10.1117/12.838768}
+}
+
@article{DBLP:journals/tifs/KodovskyFH12,
author = {Jan Kodovsk{\'y} and
Jessica J. Fridrich and