X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/2f1da93968b1c2ccd0c69148e74779a3024b1efb..1972a1712401045673b61f1064092180ea794c78:/bib/biblioand.bib?ds=sidebyside diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 5237b4a..b119611 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,445 @@ % This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + +@article{BDCC16, +year={2015}, +journal={Multimedia Tools and Applications}, +title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.}, +publisher={Springer US}, +author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and +Couturier, Raphaël}, +note={to appear}, +} + + + +@inproceedings{CW99, +author = {Chen, Brian and Wornell, Gregory W.}, +title = {Provably robust digital watermarking}, +journal = {Proc. SPIE}, +volume = {3845}, +number = {}, +pages = {43-54}, +year = {1999}, +doi = {10.1117/12.371232}, +URL = { http://dx.doi.org/10.1117/12.371232}, +eprint = {} +} + +@INPROCEEDINGS{DM10, +author={Darazi, R. and Hu, R. and Macq, B.}, +booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on}, +title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models}, +year={2010}, +pages={1742-1745}, +keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking}, +doi={10.1109/ICASSP.2010.5495455}, +ISSN={1520-6149}, +month={March},} + +@INPROCEEDINGS{WLSYNW13, +author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng }, +booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on}, +title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model}, +year={2013}, +pages={4522-4526}, +keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model}, +doi={10.1109/ICIP.2013.6738931}, +month={Sept},} + + +@article{CW01, +year={2001}, +issn={0922-5773}, +journal={Journal of VLSI signal processing systems for signal, image and video technology}, +volume={27}, +number={1-2}, +title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia}, +publisher={Kluwer Academic Publishers}, +keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation}, +author={Chen, Brian and Wornell, Gregory W.}, +pages={7--33} +} + +@InProceedings{WT08, + author = {Wang, C. T. and Tsai, W. H. }, + title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {1--6}, + OPTmonth = {}, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/sigpro/LeeT10, + author = {I{-}Shi Lee and + Wen{-}Hsiang Tsai}, + title = {A new approach to covert communication via {PDF} files}, + journal = {Signal Processing}, + volume = {90}, + number = {2}, + pages = {557--565}, + year = {2010}, + url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022}, + doi = {10.1016/j.sigpro.2009.07.022}, + timestamp = {Wed, 13 Jan 2010 11:24:36 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@Article{LLGC13, + author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.}, + title = {A Copyright Protection Scheme Based on PDF}, + journal = {International Journal of Innovative Computing, Information and Control}, + year = {2013}, + OPTkey = {}, + volume = {9}, + number = {1}, + pages = {1--6}, + OPTmonth = {}, + note = {ISSN 1349-4198}, + OPTannote = {} +} + +@Misc{ACDV12, + author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.}, + title = {Using Steganography to hide messages inside PDF files}, + howpublished = {SSN Project Report}, + month = dec, + year = {2012}, + OPTnote = {34p,} +} + +@InProceedings{PD2008, + author = {POR, L. Y. and Delina, B.}, + title = {Information Hiding: A New Approach in Text Steganography}, + booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTpages = {}, + month = apr, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/tifs/PevnyBF10, + author = {Tom{\'{a}}s Pevn{\'{y}} and + Patrick Bas and + Jessica J. Fridrich}, + title = {Steganalysis by subtractive pixel adjacency matrix}, + journal = {{IEEE} Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + pages = {215--224}, + year = {2010}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2045842}, + doi = {10.1109/TIFS.2010.2045842}, + timestamp = {Sat, 25 Sep 2010 12:20:13 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@INPROCEEDINGS{rifq/others03, + author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4425}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of resemblance}, + booktitle = {{IFSA}'03}, + year = {2003}, + location = {Istanbul, Turkey} +} + + +@ARTICLE{Rifqi:2000:DPM:342947.342970, + author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4417}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of comparison}, + journal = {{F}uzzy {S}ets and {S}ystems}, + volume = {110}, + year = {2000}, + pages = {189-196} +} + + + +@book{Anderberg-Cluster-1973, + added-at = {2008-10-29T00:31:48.000+0100}, + author = {Anderberg, M. R.}, + biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka}, + interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0}, + intrahash = {f586cc49441c591f06539d11d3e06006}, + keywords = {cluster_analysis wismasys0809}, + publisher = {Academic Press}, + timestamp = {2008-10-29T00:31:48.000+0100}, + title = {Cluster Analysis for Applications}, + year = 1973 +} + + + +@article{yule1950introduction, + Author = {Yule, G.U. and Kendall, MG}, + Date-Added = {2009-08-14 22:16:50 -0500}, + Date-Modified = {2009-08-14 22:16:50 -0500}, + Journal = {Statistics}, + Title = {An Introduction to the Theory of}, + Year = {1950}} + + +@inproceedings{fgb11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques}, +title = {Chaotic Iterations for Steganography - Stego-security and chaos-security}, +booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, +pages = {218--227}, +address = {Sevilla, Spain}, +editor = {Javier Lopez and Pierangela Samarati}, +publisher = {SciTePress}, +month = jul, +year = 2011, + +} + + +@ARTICLE{Cayre2008, + author = {Cayre, F. and Bas, P.}, + title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2008}, + volume = {3}, + pages = {1--15}, + number = {1}, + doi = {10.1109/TIFS.2007.916006}, + issn = {1556-6013}, + keywords = {cryptography, random sequences, spread spectrum communication, telecommunication + security, watermarking, Kerckhoffs-based embedding security classes, + WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques, + steganography security, watermark-only-attack, watermarking, Security, + spread-spectrum (SS) watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} +@INPROCEEDINGS{Perez06, + author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro }, + title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership + Approach}, + booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California}, + year = {2006}, + volume =6072, + pages={1--12}, + month = jan, + publisher = spie, + address = spie_loc +} + + + +@ARTICLE{Cayre2005, + author = {Cayre, F. and Fontaine, C. and Furon, T.}, + title = {Watermarking security: theory and practice}, + journal = {IEEE Transactions on Signal Processing}, + year = {2005}, + volume = {53}, + pages = {3976--3987}, + number = {10}, + keywords = {blind source separation, cryptography, watermarking, Fisher information + matrix, blind source separation, cryptanalysis, information theory, + spread spectrum techniques, substitutive scheme, watermarking security, + Blind source separation, Fisher information matrix, equivocation, + security, watermarking} +} + + + +@inproceedings{Shujun1, + author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong}, + title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and + Their Roles in Cryptography and Pseudo-Random Coding}, + booktitle = {Cryptography and Coding, 8th IMA International Conference, + Cirencester, UK}, + month=dec, + year = 2001, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {2260}, + pages = {205--221}} + + +@misc{cgh16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille}, +title = {Random Walk in a N-cube Without Hamiltonian Cycle + to Chaotic Pseudorandom Number Generation: Theoretical and Practical + Considerations}, +howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days}, +month = mar, +year = 2015, +} + + +@misc{bgco16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel}, +title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses}, +howpublished = {in submission to the ACM Computing Surveys journal}, +month = aug, +year = 2015, +} + +@misc{bdcc15:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = { +Bitar, Ahmad and +Darazi, Rony and +Couchot, Jean-Fran{\c}cois and +Couturier, Rapha\¨el}, +title = {Blind digital watermarking in PDF documents using +Spread Transform Dither Modulation}, +howpublished = {in submission to the Multimedia Tools and Applications journal}, +month = dec, +year = 2014 +} + + + + + +@inproceedings{couchot04:onp, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois}, +title = {V\'erification d'invariant par superposition}, +booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}}, +address = {Calais, France}, +ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz}, +url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html}, +note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}}, +abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.}, +month = oct, +year = 2004, + +} + + + + +@inproceedings{aangc+15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques}, +title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species}, +booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I}, +pages = {379--390}, +doi = {10.1007/978-3-319-16483-0_38}, +url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38}, +series = {LNCS}, +volume = 9043, +address = {Granada, Spain}, +month = apr, +year = 2015, + +} + + + + + + + +@inproceedings{agcs+15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques}, +affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)}, +title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes}, +booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology}, +pages = {***--***}, +series = {LNCS/LNBI}, +volume = {*}, +publisher = {Springer}, +address = {Mexico City, Mexico}, +day = 4, +month = aug, +year = 2015, +note = {To appear in the LNCS/LNBI series}, + +} + + + +@inproceedings{bcg11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations}, +booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet}, +pages = {52--57}, +address = {Luxembourg, Luxembourg}, +month = jun, +year = 2011, +note = {Best paper award}, + +} + +@article{bcg12:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLNI}, +impact-factor ={#}, +isi-acro = {#}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Quality analysis of a chaotic proven keyed hash function}, +journal = {International Journal On Advances in Internet Technology}, +pages = {26--33}, +volume = 5, +number = 1, +publisher = {IARIA}, +year = 2012, + +} + + @article{ccg15:ij, inhal = {no}, domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, @@ -152,32 +591,84 @@ howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Mon day = 23, month = sep, year = 2014, +} + + + + + +@inproceedings{aagp+15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTIN}, +author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois}, +title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization}, +booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics}, +pages = {***--***}, +address = {Naples, Italy}, +day = 10, +month = sep, +year = 2015, +note = {To appear}, } -@InProceedings{, - author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot, -Michel Salomon, Jacques M Bahi}, - title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, - OPTcrossref = {}, - OPTkey = {}, - booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)}, - OPTyear = {2014}, - OPTeditor = {}, - OPTvolume = {}, - OPTnumber = {}, - OPTseries = {}, - pages = {***--***}, - month = nov, - address = {Belfast, UK}, - OPTorganization = {}, - publisher = {IEE }, - note = {To appear}, - OPTannote = {} +@inproceedings{acgm+14:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques}, +title = {Finding the Core-Genes of Chloroplasts}, +booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science}, +pages = {357--364}, +series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics}, +number = {4(5)}, +doi = {10.7763/IJBBB.2014.V4.371}, +url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371}, +address = {Copenhagen, Denmark}, +day = 18, +month = jun, +year = 2014, + } + +@inproceedings{akgcs+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques}, +title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, +booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine}, +address = {Belfast, United Kingdom}, +day = 2, +month = nov, +year = 2014, +note = {Short paper}, +} + +@misc{acgs13:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel}, +title = {Finding the core-genes of Chloroplast Species}, +howpublished = {Journ\'ees SeqBio 2013, Montpellier}, +month = nov, +year = 2013, + +} + + + + + @PhdThesis{guyeuxphd, author = {Guyeux, Christophe}, title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique}, @@ -235,6 +726,70 @@ year = 2006, Pages = "53--65" } +@inproceedings{cg04:np, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain}, +title = {Analyse d'atteignabilit\'e d\'eductive}, +booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04}, +pages = {269--283}, +editor = {Julliand, Jacques}, +address = {Besan\c{c}on, France}, +month = jun, +year = 2004, + +} + + +@article{cdgr03:ij, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {Scalable Automated Proving and Debugging of Set-Based Specifications}, +journal = {Journal of the Brazilian Computer Society (JBCS)}, +volume = 9, +number = 2, +pages = {17--36}, +url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf}, +month = nov, +year = 2003, +note = {ISSN 0104-6500}, + +} + + +@inproceedings{cddg+04:ip, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {vesontio}, +author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {Proving and Debugging Set-Based Specifications}, +booktitle = {WMF'03 proceedings}, +series = {ENTCS, Electronic Notes in Theoretical Computer Science}, +volume = 95, +pages = {189--208}, +editor = {A. Cavalcanti and P. Machado}, +address = {Campina Grande, Brazil}, +url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012}, +month = may, +year = 2004, + +} + + +@inproceedings{cdgr04:onp, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}}, +pages = {369--372}, +booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, }, +address = {Besan\c{c}on, France}, +month = jun, +year = 2004, +editor = {Julliand, Jacques}, +note = {Session outils}, + +} + + @INPROCEEDINGS{CGK05, author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, title = {A uniform deductive approach for parameterized protocol safety}, @@ -1148,6 +1703,10 @@ author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, language={English} } + + + + @inproceedings{conf/wifs/HolubF12, added-at = {2013-01-23T00:00:00.000+0100}, author = {Holub, Vojtech and Fridrich, Jessica J.}, @@ -1167,7 +1726,17 @@ language={English} year = 2012 } - +@proceedings{conf/wifs/2012, + title = {2012 {IEEE} International Workshop on Information Forensics and Security, + {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012}, + publisher = {{IEEE}}, + year = {2012}, + url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850}, + isbn = {978-1-4673-2285-0}, + timestamp = {Wed, 23 Jan 2013 20:32:42 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} @article{FillerJF11, @@ -1820,6 +2389,17 @@ keywords = "Fuzzy edge detector" OPTannote = {} } +@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10, + author = {Jan Kodovský and + Tomás Pevný and + Jessica J. Fridrich}, + title = {Modern steganalysis can detect YASS.}, + booktitle = {Media Forensics and Security}, + year = {2010}, + pages = {754102}, + ee = {http://dx.doi.org/10.1117/12.838768} +} + @article{DBLP:journals/tifs/KodovskyFH12, author = {Jan Kodovsk{\'y} and Jessica J. Fridrich and