X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/4c34b0cbf5b0f3a369527f1dc8aa1df2449d7a4e..1972a1712401045673b61f1064092180ea794c78:/bib/biblioand.bib diff --git a/bib/biblioand.bib b/bib/biblioand.bib index f8fc3c4..b119611 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -2,6 +2,342 @@ % Encoding: ANSI_X3.4-1968 +@article{BDCC16, +year={2015}, +journal={Multimedia Tools and Applications}, +title={Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.}, +publisher={Springer US}, +author={Bitar, Ahmad and Darazi, Rony and Couchot, Jean-François and +Couturier, Raphaël}, +note={to appear}, +} + + + +@inproceedings{CW99, +author = {Chen, Brian and Wornell, Gregory W.}, +title = {Provably robust digital watermarking}, +journal = {Proc. SPIE}, +volume = {3845}, +number = {}, +pages = {43-54}, +year = {1999}, +doi = {10.1117/12.371232}, +URL = { http://dx.doi.org/10.1117/12.371232}, +eprint = {} +} + +@INPROCEEDINGS{DM10, +author={Darazi, R. and Hu, R. and Macq, B.}, +booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on}, +title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models}, +year={2010}, +pages={1742-1745}, +keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking}, +doi={10.1109/ICASSP.2010.5495455}, +ISSN={1520-6149}, +month={March},} + +@INPROCEEDINGS{WLSYNW13, +author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng }, +booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on}, +title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model}, +year={2013}, +pages={4522-4526}, +keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model}, +doi={10.1109/ICIP.2013.6738931}, +month={Sept},} + + +@article{CW01, +year={2001}, +issn={0922-5773}, +journal={Journal of VLSI signal processing systems for signal, image and video technology}, +volume={27}, +number={1-2}, +title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia}, +publisher={Kluwer Academic Publishers}, +keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation}, +author={Chen, Brian and Wornell, Gregory W.}, +pages={7--33} +} + +@InProceedings{WT08, + author = {Wang, C. T. and Tsai, W. H. }, + title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {1--6}, + OPTmonth = {}, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/sigpro/LeeT10, + author = {I{-}Shi Lee and + Wen{-}Hsiang Tsai}, + title = {A new approach to covert communication via {PDF} files}, + journal = {Signal Processing}, + volume = {90}, + number = {2}, + pages = {557--565}, + year = {2010}, + url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022}, + doi = {10.1016/j.sigpro.2009.07.022}, + timestamp = {Wed, 13 Jan 2010 11:24:36 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@Article{LLGC13, + author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.}, + title = {A Copyright Protection Scheme Based on PDF}, + journal = {International Journal of Innovative Computing, Information and Control}, + year = {2013}, + OPTkey = {}, + volume = {9}, + number = {1}, + pages = {1--6}, + OPTmonth = {}, + note = {ISSN 1349-4198}, + OPTannote = {} +} + +@Misc{ACDV12, + author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.}, + title = {Using Steganography to hide messages inside PDF files}, + howpublished = {SSN Project Report}, + month = dec, + year = {2012}, + OPTnote = {34p,} +} + +@InProceedings{PD2008, + author = {POR, L. Y. and Delina, B.}, + title = {Information Hiding: A New Approach in Text Steganography}, + booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTpages = {}, + month = apr, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/tifs/PevnyBF10, + author = {Tom{\'{a}}s Pevn{\'{y}} and + Patrick Bas and + Jessica J. Fridrich}, + title = {Steganalysis by subtractive pixel adjacency matrix}, + journal = {{IEEE} Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + pages = {215--224}, + year = {2010}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2045842}, + doi = {10.1109/TIFS.2010.2045842}, + timestamp = {Sat, 25 Sep 2010 12:20:13 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@INPROCEEDINGS{rifq/others03, + author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4425}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of resemblance}, + booktitle = {{IFSA}'03}, + year = {2003}, + location = {Istanbul, Turkey} +} + + +@ARTICLE{Rifqi:2000:DPM:342947.342970, + author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4417}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of comparison}, + journal = {{F}uzzy {S}ets and {S}ystems}, + volume = {110}, + year = {2000}, + pages = {189-196} +} + + + +@book{Anderberg-Cluster-1973, + added-at = {2008-10-29T00:31:48.000+0100}, + author = {Anderberg, M. R.}, + biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka}, + interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0}, + intrahash = {f586cc49441c591f06539d11d3e06006}, + keywords = {cluster_analysis wismasys0809}, + publisher = {Academic Press}, + timestamp = {2008-10-29T00:31:48.000+0100}, + title = {Cluster Analysis for Applications}, + year = 1973 +} + + + +@article{yule1950introduction, + Author = {Yule, G.U. and Kendall, MG}, + Date-Added = {2009-08-14 22:16:50 -0500}, + Date-Modified = {2009-08-14 22:16:50 -0500}, + Journal = {Statistics}, + Title = {An Introduction to the Theory of}, + Year = {1950}} + + +@inproceedings{fgb11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques}, +title = {Chaotic Iterations for Steganography - Stego-security and chaos-security}, +booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, +pages = {218--227}, +address = {Sevilla, Spain}, +editor = {Javier Lopez and Pierangela Samarati}, +publisher = {SciTePress}, +month = jul, +year = 2011, + +} + + +@ARTICLE{Cayre2008, + author = {Cayre, F. and Bas, P.}, + title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2008}, + volume = {3}, + pages = {1--15}, + number = {1}, + doi = {10.1109/TIFS.2007.916006}, + issn = {1556-6013}, + keywords = {cryptography, random sequences, spread spectrum communication, telecommunication + security, watermarking, Kerckhoffs-based embedding security classes, + WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques, + steganography security, watermark-only-attack, watermarking, Security, + spread-spectrum (SS) watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} +@INPROCEEDINGS{Perez06, + author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro }, + title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership + Approach}, + booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California}, + year = {2006}, + volume =6072, + pages={1--12}, + month = jan, + publisher = spie, + address = spie_loc +} + + + +@ARTICLE{Cayre2005, + author = {Cayre, F. and Fontaine, C. and Furon, T.}, + title = {Watermarking security: theory and practice}, + journal = {IEEE Transactions on Signal Processing}, + year = {2005}, + volume = {53}, + pages = {3976--3987}, + number = {10}, + keywords = {blind source separation, cryptography, watermarking, Fisher information + matrix, blind source separation, cryptanalysis, information theory, + spread spectrum techniques, substitutive scheme, watermarking security, + Blind source separation, Fisher information matrix, equivocation, + security, watermarking} +} + + + +@inproceedings{Shujun1, + author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong}, + title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and + Their Roles in Cryptography and Pseudo-Random Coding}, + booktitle = {Cryptography and Coding, 8th IMA International Conference, + Cirencester, UK}, + month=dec, + year = 2001, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {2260}, + pages = {205--221}} + + +@misc{cgh16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille}, +title = {Random Walk in a N-cube Without Hamiltonian Cycle + to Chaotic Pseudorandom Number Generation: Theoretical and Practical + Considerations}, +howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days}, +month = mar, +year = 2015, +} + + +@misc{bgco16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel}, +title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses}, +howpublished = {in submission to the ACM Computing Surveys journal}, +month = aug, +year = 2015, +} + +@misc{bdcc15:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = { +Bitar, Ahmad and +Darazi, Rony and +Couchot, Jean-Fran{\c}cois and +Couturier, Rapha\¨el}, +title = {Blind digital watermarking in PDF documents using +Spread Transform Dither Modulation}, +howpublished = {in submission to the Multimedia Tools and Applications journal}, +month = dec, +year = 2014 +} + + + + @inproceedings{couchot04:onp, inhal = {no}, @@ -257,6 +593,10 @@ month = sep, year = 2014, } + + + + @inproceedings{aagp+15:ip, inhal = {no}, domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, @@ -1363,6 +1703,10 @@ author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, language={English} } + + + + @inproceedings{conf/wifs/HolubF12, added-at = {2013-01-23T00:00:00.000+0100}, author = {Holub, Vojtech and Fridrich, Jessica J.}, @@ -1382,7 +1726,17 @@ language={English} year = 2012 } - +@proceedings{conf/wifs/2012, + title = {2012 {IEEE} International Workshop on Information Forensics and Security, + {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012}, + publisher = {{IEEE}}, + year = {2012}, + url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850}, + isbn = {978-1-4673-2285-0}, + timestamp = {Wed, 23 Jan 2013 20:32:42 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} @article{FillerJF11, @@ -2035,6 +2389,17 @@ keywords = "Fuzzy edge detector" OPTannote = {} } +@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10, + author = {Jan Kodovský and + Tomás Pevný and + Jessica J. Fridrich}, + title = {Modern steganalysis can detect YASS.}, + booktitle = {Media Forensics and Security}, + year = {2010}, + pages = {754102}, + ee = {http://dx.doi.org/10.1117/12.838768} +} + @article{DBLP:journals/tifs/KodovskyFH12, author = {Jan Kodovsk{\'y} and Jessica J. Fridrich and