X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/9aadb3604ef52f836ecadc9d6241da6909553e8c..034ec955613be069eeb9cb95ffe5e194e362b1c5:/bib/biblioand.bib?ds=inline diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 1dc7a4b..7a15d9d 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,1118 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 +@Article{Bykov2016, +author="Bykov, I. S.", +title="On locally balanced gray codes", +journal="Journal of Applied and Industrial Mathematics", +year="2016", +volume="10", +number="1", +pages="78--85", +abstract="We consider locally balanced Gray codes.We say that a Gray code is locally balanced if every ``short'' subword in its transition sequence contains all letters of the alphabet |1, 2,..., n{\textasciitilde}. The minimal length of these subwords is the window width of the code. We show that for each n ≥ 3 there exists a Gray code with window width at most n + 3⌊log n⌋.", +issn="1990-4797", +} + + +@article{DBLP:journals/ijbc/Lozi12, + author = {R. Lozi}, + title = {Emergence of Randomness from Chaos}, + journal = {I. J. Bifurcation and Chaos}, + volume = {22}, + number = {2}, + year = {2012}, + url = {http://dx.doi.org/10.1142/S0218127412500216}, + doi = {10.1142/S0218127412500216}, + timestamp = {Tue, 27 Mar 2012 19:10:15 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/ijbc/Lozi12}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@article{lozi:hal-00813087, + TITLE = {{From Chaos to Randomness via Geometric Undersampling}}, + AUTHOR = {Lozi, Ren{\'e} and Taralova, Ina}, + URL = {https://hal.archives-ouvertes.fr/hal-00813087}, + NOTE = {Editors: Witold Jarczyk, Daniele Fournier-Prunaret, João Manuel Goncalves Cabral}, + JOURNAL = {{ESAIM: Proceedings and Surveys}}, + PUBLISHER = {{EDP Sciences}}, + SERIES = {ECIT 2012}, + VOLUME = {46}, + PAGES = {177-195}, + YEAR = {2014}, + MONTH = Nov, + DOI = {10.1051/proc/201446015}, + KEYWORDS = {chaos ; Pseudo Random Number generator ; geometric undersampling}, + PDF = {https://hal.archives-ouvertes.fr/hal-00813087/file/Lozi_Taralova_ECIT_2012_HAL.pdf}, + HAL_ID = {hal-00813087}, + HAL_VERSION = {v1}, +} + +@inproceedings{espinelrojas:hal-00622989, + TITLE = {{NEW ALTERNATE LOZI FUNCTION FOR RANDOM NUMBER GENERATION}}, + AUTHOR = {Espinel Rojas, Andrea and Taralova, Ina and Lozi, Ren{\'e}}, + URL = {https://hal.archives-ouvertes.fr/hal-00622989}, + BOOKTITLE = {{EPNACS 2011 within ECCS'11}}, + ADDRESS = {Vienne, Austria}, + PAGES = {13-15}, + YEAR = {2011}, + MONTH = Sep, + KEYWORDS = {Nonlinear dynamical system ; Lozi function ; NIST test ; discrete-time map ; dense chaotic attractor ; pseudo random number generator}, + PDF = {https://hal.archives-ouvertes.fr/hal-00622989/file/NEW_ALTERNATE_LOZI_FUNCTION_FOR_RANDOM_NUMBER_GENERATION.pdf}, + HAL_ID = {hal-00622989}, + HAL_VERSION = {v1}, +} + + + +@inproceedings{mansingka2013fibonacci, + title={Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System}, + author={Mansingka, Abhinav S and Barakat, Mohamed L and Zidan, M Affan and Radwan, Ahmed G and Salama, Khaled N}, + booktitle={IT Convergence and Security (ICITCS), 2013 International Conference on}, + pages={1--4}, + year={2013}, + organization={IEEE}} + + +@article{Rossler1976397, +title = "An equation for continuous chaos", +journal = "Physics Letters A", +volume = "57", +number = "5", +pages = "397 - 398", +year = "1976", +note = "", +issn = "0375-9601", +doi = "http://dx.doi.org/10.1016/0375-9601(76)90101-8", +url = "http://www.sciencedirect.com/science/article/pii/0375960176901018", +author = "O.E. Rössler", + +} + + +@INPROCEEDINGS{6868789, +author={Dabal, Pawel and Pelka, Ryszard}, +booktitle={Design and Diagnostics of Electronic Circuits Systems, 17th International Symposium on}, +title={A study on fast pipelined pseudo-random number generator based on chaotic logistic map}, +year={2014}, +month={April}, +pages={195-200}, +keywords={chaotic systems;logistic map;pseudo-random bit generator;system-on-chip}, +doi={10.1109/DDECS.2014.6868789},} + + + @article{may1976simple, + title={Simple mathematical models with very complicated dynamics}, + author={May, Robert M and others}, + journal={Nature}, + volume={261}, + number={5560}, + pages={459--467}, + year={1976}, + publisher={London}} + +@article{Silva:2009:LLP:1592409.1592411, + author = {Silva, Rui Miguel and Crespo, Rui Gustavo and Nunes, Mario Serafim}, + title = {LoBa128, a Lorenz\&\#45;Based PRNG for Wireless Sensor Networks}, + journal = {Int. J. Commun. Netw. Distrib. Syst.}, + issue_date = {August 2009}, + volume = {3}, + number = {4}, + month = aug, + year = {2009}, + issn = {1754-3916}, + pages = {301--318}, + numpages = {18}, + url = {http://dx.doi.org/10.1504/IJCNDS.2009.027596}, + doi = {10.1504/IJCNDS.2009.027596}, + acmid = {1592411}, + publisher = {Inderscience Publishers}, + address = {Inderscience Publishers, Geneva, SWITZERLAND}, + keywords = {PRNG, WSN, chaos cryptography, key management, pseudo\&\#45;random number generator, statistical attacks, symmetrical encryption, wireless networks, wireless sensor networks}, +} + +@ARTICLE{Lorenz1963, + author = {{Lorenz}, E.~N.}, + title = "{Deterministic Nonperiodic Flow.}", + journal = {Journal of Atmospheric Sciences}, + year = 1963, + month = mar, + volume = 20, + pages = {130-148}, + doi = {10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2}, + adsurl = {http://adsabs.harvard.edu/abs/1963JAtS...20..130L}, + adsnote = {Provided by the SAO/NASA Astrophysics Data System} +} + + + +@article{Fang:2014:FAP:2643744.2643848, + author = {Fang, Xiaole and Wang, Qianxue and Guyeux, Christophe and Bahi, Jacques M.}, + title = {FPGA Acceleration of a Pseudorandom Number Generator Based on Chaotic Iterations}, + journal = {J. Inf. Secur. Appl.}, + issue_date = {February, 2014}, + volume = {19}, + number = {1}, + month = feb, + year = {2014}, + issn = {2214-2126}, + pages = {78--87}, + numpages = {10}, + url = {http://dx.doi.org/10.1016/j.jisa.2014.02.003}, + doi = {10.1016/j.jisa.2014.02.003}, + acmid = {2643848}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {Cryptographical security, Discrete chaotic iterations, FPGA, Internet security, Pseudorandom number generator}, +} + + + +@inproceedings{mao2006design, + title={Design and FPGA implementation of a pseudo-random bit sequence generator using spatiotemporal chaos}, + author={Mao, Yaobin and Cao, Liu and Liu, Wenbo}, + booktitle={Communications, Circuits and Systems Proceedings, 2006 International Conference on}, + volume={3}, + pages={2114--2118}, + year={2006}, + organization={IEEE}} + + +@article{merahcoupling13, + title={Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System-Study and Real Time FPGA Implementation}, + author={Merah, Lahcene and ALI-PACHA, Adda and SAID, Naima HADJ}, + year=2013, + month=oct, + volume=4, + issue=10, + journal={International Journal of Computer Science and Telecommunications} + } + + +@article{henon1976two, + title={A two-dimensional mapping with a strange attractor}, + author={H{\'e}non, Michel}, + journal={Communications in Mathematical Physics}, + volume={50}, + number={1}, + pages={69--77}, + year={1976}, + publisher={Springer}} + + @inproceedings{liu2008improved, + title={An improved chaos-based stream cipher algorithm and its VLSI implementation}, + author={Liu, Shubo and Sun, Jing and Xu, Zhengquan and Cai, Zhaohui}, + booktitle={Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on}, + volume={2}, + pages={191--197}, + year={2008}, + organization={IEEE}} + + +@inproceedings{dabal2012fpga, + title={FPGA implementation of chaotic pseudo-random bit generators}, + author={Dabal, Pawel and Pelka, Ryszard}, + booktitle={Mixed Design of Integrated Circuits and Systems (MIXDES), 2012 Proceedings of the 19th International Conference}, + pages={260--264}, + year={2012}, + organization={IEEE}} + +@inproceedings{dabal2011chaos, + title={A chaos-based pseudo-random bit generator implemented in FPGA device}, + author={Dabal, Pawel and Pelka, Ryszard}, + booktitle={Design and Diagnostics of Electronic Circuits \& Systems (DDECS), 2011 IEEE 14th International Symposium on}, + pages={151--154}, + year={2011}, + organization={IEEE}} + + +@book{wiggins2003introduction, + title={Introduction to applied nonlinear dynamical systems and chaos}, + author={Wiggins, Stephen}, + volume={2}, + year={2003}, + publisher={Springer Science \& Business Media} +} + +@inproceedings{aagc+15:ip, + author = {Bassam AlKindy and + Bashar Al{-}Nuaimi and + Christophe Guyeux and + Jean{-}Fran{\c{c}}ois Couchot and + Michel Salomon and + Reem Alsrraj and + Laurent Philippe}, + title = {Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm + for Inferring Well Supported Phylogenetic Trees}, + booktitle = {Computational Intelligence Methods for Bioinformatics and Biostatistics + - 12th International Meeting, {CIBB} 2015, Naples, Italy, September + 10-12, 2015, Revised Selected Papers}, + pages = {165--179}, + year = {2015}, + crossref = {DBLP:conf/cibb/2015}, + url = {http://dx.doi.org/10.1007/978-3-319-44332-4_13}, + doi = {10.1007/978-3-319-44332-4_13}, + timestamp = {Tue, 02 Aug 2016 16:01:45 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/AlKindyAGCSAP15}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@proceedings{DBLP:conf/cibb/2015, + editor = {Claudia Angelini and + Paola M. V. Rancoita and + Stefano Rovetta}, + title = {Computational Intelligence Methods for Bioinformatics and Biostatistics + - 12th International Meeting, {CIBB} 2015, Naples, Italy, September + 10-12, 2015, Revised Selected Papers}, + series = {Lecture Notes in Computer Science}, + volume = {9874}, + publisher = {Springer}, + year = {2016}, + url = {http://dx.doi.org/10.1007/978-3-319-44332-4}, + doi = {10.1007/978-3-319-44332-4}, + isbn = {978-3-319-44331-7}, + timestamp = {Tue, 02 Aug 2016 16:01:14 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/cibb/2015}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + + + +@inproceedings{DBLP:conf/apsipa/TanL14, + author = {Shunquan Tan and + Bin Li}, + title = {Stacked convolutional auto-encoders for steganalysis of digital images}, + booktitle = {Asia-Pacific Signal and Information Processing Association Annual + Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December + 9-12, 2014}, + pages = {1--4}, + year = {2014}, + crossref = {DBLP:conf/apsipa/2014}, + url = {http://dx.doi.org/10.1109/APSIPA.2014.7041565}, + doi = {10.1109/APSIPA.2014.7041565}, + timestamp = {Sat, 14 Mar 2015 17:34:07 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/TanL14}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} +@proceedings{DBLP:conf/apsipa/2014, + title = {Asia-Pacific Signal and Information Processing Association Annual + Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December + 9-12, 2014}, + publisher = {{IEEE}}, + year = {2014}, + url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7016284}, + isbn = {978-6-1636-1823-8}, + timestamp = {Sat, 14 Mar 2015 15:24:04 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/apsipa/2014}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@inproceeding{doi:10.1117/12.2083479, +author = {Qian, Yinlong and Dong, Jing and Wang, Wei and Tan, Tieniu}, +title = { +Deep learning for steganalysis via convolutional neural networks +}, +journal = {Proc. SPIE}, +volume = {9409}, +number = {}, +pages = {94090J-94090J-10}, +abstract = { +Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database. +}, +year = {2015}, +doi = {10.1117/12.2083479}, +URL = { http://dx.doi.org/10.1117/12.2083479}, +eprint = {} +} + + + +@inproceedings{DBLP:conf/ijcai/CiresanMMGS11, + author = {Dan Claudiu Ciresan and + Ueli Meier and + Jonathan Masci and + Luca Maria Gambardella and + J{\"{u}}rgen Schmidhuber}, + title = {Flexible, High Performance Convolutional Neural Networks for Image + Classification}, + booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference + on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, + 2011}, + pages = {1237--1242}, + year = {2011}, + crossref = {DBLP:conf/ijcai/2011}, + url = {http://ijcai.org/papers11/Papers/IJCAI11-210.pdf}, + timestamp = {Tue, 09 Aug 2011 14:09:58 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/CiresanMMGS11}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@proceedings{DBLP:conf/ijcai/2011, + editor = {Toby Walsh}, + title = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference + on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, + 2011}, + publisher = {{IJCAI/AAAI}}, + year = {2011}, + isbn = {978-1-57735-516-8}, + timestamp = {Tue, 09 Aug 2011 14:09:58 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/ijcai/2011}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@article{DBLP:journals/ftsig/DengY14, + author = {Li Deng and + Dong Yu}, + title = {Deep Learning: Methods and Applications}, + journal = {Foundations and Trends in Signal Processing}, + volume = {7}, + number = {3-4}, + pages = {197--387}, + year = {2014}, + url = {http://dx.doi.org/10.1561/2000000039}, + doi = {10.1561/2000000039}, + timestamp = {Tue, 08 Jul 2014 15:28:41 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/ftsig/DengY14}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@article{BDCC16, +author="Bitar, Ahmad W. +and Darazi, Rony +and Couchot, Jean-Fran{\c{c}}ois +and Couturier, Rapha{\"e}l", +title="Blind digital watermarking in PDF documents using Spread Transform Dither Modulation", +year="2015", +pages="1--19", +abstract="In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.", +issn="1573-7721", +doi="10.1007/s11042-015-3034-2", +url="http://dx.doi.org/10.1007/s11042-015-3034-2", +journal={Multimedia Tools and Applications}, +publisher={Springer US}, +} + + + +@inproceedings{CW99, +author = {Chen, Brian and Wornell, Gregory W.}, +title = {Provably robust digital watermarking}, +journal = {Proc. SPIE}, +volume = {3845}, +number = {}, +pages = {43-54}, +year = {1999}, +doi = {10.1117/12.371232}, +URL = { http://dx.doi.org/10.1117/12.371232}, +eprint = {} +} + +@INPROCEEDINGS{DM10, +author={Darazi, R. and Hu, R. and Macq, B.}, +booktitle={Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on}, +title={Applying Spread Transform Dither Modulation for 3D-mesh watermarking by using perceptual models}, +year={2010}, +pages={1742-1745}, +keywords={transforms;watermarking;3D-mesh watermarking;curvature;perceptual models;spherical coordinates system;spread transform dither modulation;Computer aided manufacturing;Humans;Laboratories;Quantization;Remote sensing;Robustness;Signal generators;Signal processing;Visual system;Watermarking;3D meshes;Human Visual System (HVS);Quantization Index Modulation(QIM);Watermarking}, +doi={10.1109/ICASSP.2010.5495455}, +ISSN={1520-6149}, +month={March},} + +@INPROCEEDINGS{WLSYNW13, +author={Wan, Wenbo and Liu, Ju and Sun, Jiande and Yang,XiaoHui and Nie, Xiushan and Wang, Feng }, +booktitle={Image Processing (ICIP), 2013 20th IEEE International Conference on}, +title={Logarithmic Spread-Transform Dither Modulation watermarking Based on Perceptual Model}, +year={2013}, +pages={4522-4526}, +keywords={inverse transforms;quantisation (signal);random processes;vectors;watermarking;LQIM;LSTDM-WM;inverse transform;logarithmic quantization function;logarithmic quantization index modulation;logarithmic spread-transform dither modulation based on perceptual model;logarithmic spread-transform dither modulation watermarking;quantization-based watermarking method;quantized signal;random vector;volumetric scaling attack;watermark data;watermark embedding;watermarked signal;Digital Watermarking;LQIM;LSTDM-MW;STDM;Watson's perceptual model}, +doi={10.1109/ICIP.2013.6738931}, +month={Sept},} + + +@article{CW01, +year={2001}, +issn={0922-5773}, +journal={Journal of VLSI signal processing systems for signal, image and video technology}, +volume={27}, +number={1-2}, +title={Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia}, +publisher={Kluwer Academic Publishers}, +keywords={digital watermarking; information embedding; quantization index modulation; dither modulation; distortion compensation}, +author={Chen, Brian and Wornell, Gregory W.}, +pages={7--33} +} + +@InProceedings{WT08, + author = {Wang, C. T. and Tsai, W. H. }, + title = {Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {Proceedings of 2008 Conference on Computer Vision, Graphics and Image Processing}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {1--6}, + OPTmonth = {}, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/sigpro/LeeT10, + author = {I{-}Shi Lee and + Wen{-}Hsiang Tsai}, + title = {A new approach to covert communication via {PDF} files}, + journal = {Signal Processing}, + volume = {90}, + number = {2}, + pages = {557--565}, + year = {2010}, + url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022}, + doi = {10.1016/j.sigpro.2009.07.022}, + timestamp = {Wed, 13 Jan 2010 11:24:36 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@Article{LLGC13, + author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.}, + title = {A Copyright Protection Scheme Based on PDF}, + journal = {International Journal of Innovative Computing, Information and Control}, + year = {2013}, + OPTkey = {}, + volume = {9}, + number = {1}, + pages = {1--6}, + OPTmonth = {}, + note = {ISSN 1349-4198}, + OPTannote = {} +} + +@Misc{ACDV12, + author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.}, + title = {Using Steganography to hide messages inside PDF files}, + howpublished = {SSN Project Report}, + month = dec, + year = {2012}, + OPTnote = {34p,} +} + +@InProceedings{PD2008, + author = {POR, L. Y. and Delina, B.}, + title = {Information Hiding: A New Approach in Text Steganography}, + booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTpages = {}, + month = apr, + OPTaddress = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/tifs/PevnyBF10, + author = {Tom{\'{a}}s Pevn{\'{y}} and + Patrick Bas and + Jessica J. Fridrich}, + title = {Steganalysis by subtractive pixel adjacency matrix}, + journal = {{IEEE} Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + pages = {215--224}, + year = {2010}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2045842}, + doi = {10.1109/TIFS.2010.2045842}, + timestamp = {Sat, 25 Sep 2010 12:20:13 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@INPROCEEDINGS{rifq/others03, + author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4425}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of resemblance}, + booktitle = {{IFSA}'03}, + year = {2003}, + location = {Istanbul, Turkey} +} + + +@ARTICLE{Rifqi:2000:DPM:342947.342970, + author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4417}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of comparison}, + journal = {{F}uzzy {S}ets and {S}ystems}, + volume = {110}, + year = {2000}, + pages = {189-196} +} + + + +@book{Anderberg-Cluster-1973, + added-at = {2008-10-29T00:31:48.000+0100}, + author = {Anderberg, M. R.}, + biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka}, + interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0}, + intrahash = {f586cc49441c591f06539d11d3e06006}, + keywords = {cluster_analysis wismasys0809}, + publisher = {Academic Press}, + timestamp = {2008-10-29T00:31:48.000+0100}, + title = {Cluster Analysis for Applications}, + year = 1973 +} + + + +@article{yule1950introduction, + Author = {Yule, G.U. and Kendall, MG}, + Date-Added = {2009-08-14 22:16:50 -0500}, + Date-Modified = {2009-08-14 22:16:50 -0500}, + Journal = {Statistics}, + Title = {An Introduction to the Theory of}, + Year = {1950}} + + +@inproceedings{fgb11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques}, +title = {Chaotic Iterations for Steganography - Stego-security and chaos-security}, +booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, +pages = {218--227}, +address = {Sevilla, Spain}, +editor = {Javier Lopez and Pierangela Samarati}, +publisher = {SciTePress}, +month = jul, +year = 2011, + +} + + +@ARTICLE{Cayre2008, + author = {Cayre, F. and Bas, P.}, + title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2008}, + volume = {3}, + pages = {1--15}, + number = {1}, + doi = {10.1109/TIFS.2007.916006}, + issn = {1556-6013}, + keywords = {cryptography, random sequences, spread spectrum communication, telecommunication + security, watermarking, Kerckhoffs-based embedding security classes, + WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques, + steganography security, watermark-only-attack, watermarking, Security, + spread-spectrum (SS) watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} +@INPROCEEDINGS{Perez06, + author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro }, + title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership + Approach}, + booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California}, + year = {2006}, + volume =6072, + pages={1--12}, + month = jan, + publisher = spie, + address = spie_loc +} + + + +@ARTICLE{Cayre2005, + author = {Cayre, F. and Fontaine, C. and Furon, T.}, + title = {Watermarking security: theory and practice}, + journal = {IEEE Transactions on Signal Processing}, + year = {2005}, + volume = {53}, + pages = {3976--3987}, + number = {10}, + keywords = {blind source separation, cryptography, watermarking, Fisher information + matrix, blind source separation, cryptanalysis, information theory, + spread spectrum techniques, substitutive scheme, watermarking security, + Blind source separation, Fisher information matrix, equivocation, + security, watermarking} +} + + + +@inproceedings{Shujun1, + author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong}, + title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and + Their Roles in Cryptography and Pseudo-Random Coding}, + booktitle = {Cryptography and Coding, 8th IMA International Conference, + Cirencester, UK}, + month=dec, + year = 2001, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {2260}, + pages = {205--221}} + + +@misc{cgh16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille}, +title = {Random Walk in a N-cube Without Hamiltonian Cycle + to Chaotic Pseudorandom Number Generation: Theoretical and Practical + Considerations}, +howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days}, +month = mar, +year = 2015, +} + + +@misc{bgco16:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel}, +title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses}, +howpublished = {in submission to the ACM Computing Surveys journal}, +month = aug, +year = 2015, +} + + + + + + +@inproceedings{couchot04:onp, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois}, +title = {V\'erification d'invariant par superposition}, +booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}}, +address = {Calais, France}, +ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz}, +url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html}, +note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}}, +abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.}, +month = oct, +year = 2004, + +} + + + + +@inproceedings{aangc+15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques}, +title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species}, +booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I}, +pages = {379--390}, +doi = {10.1007/978-3-319-16483-0_38}, +url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38}, +series = {LNCS}, +volume = 9043, +address = {Granada, Spain}, +month = apr, +year = 2015, +} + + + + + + + +@inproceedings{agcs+15:ip, + author = {Bassam AlKindy and + Christophe Guyeux and + Jean{-}Fran{\c{c}}ois Couchot and + Michel Salomon and + Christian Parisod and + Jacques M. Bahi}, + title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well + Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core + Genes}, + booktitle = {Algorithms for Computational Biology - Second International Conference, + AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings}, + pages = {83--96}, + year = {2015}, + crossref = {DBLP:conf/alcob/2015}, + url = {http://dx.doi.org/10.1007/978-3-319-21233-3_7}, + doi = {10.1007/978-3-319-21233-3_7}, + timestamp = {Tue, 28 Jul 2015 14:46:16 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/AlKindyGCSPB15}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@proceedings{DBLP:conf/alcob/2015, + editor = {Adrian Horia Dediu and + Francisco Hern{\'{a}}ndez Quiroz and + Carlos Mart{\'{\i}}n{-}Vide and + David A. Rosenblueth}, + title = {Algorithms for Computational Biology - Second International Conference, + AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {9199}, + publisher = {Springer}, + year = {2015}, + url = {http://dx.doi.org/10.1007/978-3-319-21233-3}, + doi = {10.1007/978-3-319-21233-3}, + isbn = {978-3-319-21232-6}, + timestamp = {Tue, 28 Jul 2015 14:45:41 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/2015}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + + + + +@inproceedings{bcg11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations}, +booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet}, +pages = {52--57}, +address = {Luxembourg, Luxembourg}, +month = jun, +year = 2011, +note = {Best paper award}, + +} + +@article{bcg12:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLNI}, +impact-factor ={#}, +isi-acro = {#}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Quality analysis of a chaotic proven keyed hash function}, +journal = {International Journal On Advances in Internet Technology}, +pages = {26--33}, +volume = 5, +number = 1, +publisher = {IARIA}, +year = 2012, + +} + + +@article{ccg15:ij, + author = {Jean{-}Fran{\c{c}}ois Couchot and + Rapha{\"{e}}l Couturier and + Christophe Guyeux}, + title = {{STABYLO:} steganography with adaptive, Bbs, and binary embedding + at low cost}, + journal = {Annales des T{\'{e}}l{\'{e}}communications}, + volume = {70}, + number = {9-10}, + pages = {441--449}, + year = {2015}, + url = {http://dx.doi.org/10.1007/s12243-015-0466-7}, + doi = {10.1007/s12243-015-0466-7}, + timestamp = {Mon, 28 Sep 2015 12:42:01 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/adt/CouchotCG15}, + bibsource = {dblp computer science bibliography, http://dblp.org} + } + +@inproceedings{fccg15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe}, +title = {Steganalyzer performances in operational contexts}, +booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, +pages = {429-432}, +address = {Adelaide, Australia}, +month = sep, +year = 2015 +} + + +@inproceedings{accfg15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux}, +title = {Performance Study of Steganalysis Techniques}, +booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on}, +pages = {1--7}, +address = {Lebanon}, +month = oct, +year = 2015 +} + + + +@inproceedings{bcfg12a:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe}, +title = {Application of Steganography for Anonymity through the Internet}, +booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy}, +pages = {96--101}, +url = {http://arxiv.org/abs/1202.5302v1}, +address = {Venice, Italy}, +month = jun, +year = 2012, + +} + + + + + +@inproceedings{bcfg+13:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel}, +title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction}, +booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, +pages = {547--550}, +doi = {10.1109/IIH-MSP.2013.141}, +url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141}, +address = {Beijing, China}, +month = oct, +year = 2013, + +} + +@inproceedings{bcfg12b:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe}, +title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web}, +booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, +pages = {71--76}, +address = {Venice, Italy}, +month = jun, +year = 2012, + +} + + + + + +@inproceedings{bcg11b:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Steganography: a Class of Algorithms having Secure Properties}, +booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, +pages = {109--112}, +address = {Dalian, China}, +month = oct, +year = 2011, + +} + + +@article{bcg11:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLI}, +impact-factor ={1.363}, +isi-acro = {COMPUT J}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe}, +title = {Steganography: a class of secure and robust algorithms}, +journal = {The Computer Journal}, +volume = 55, +number = 6, +pages = {653--666}, +doi = {10.1093/comjnl/bxr116}, +url = {http://dx.doi.org/10.1093/comjnl/bxr116}, +publisher = {Oxford University Press}, +year = 2012, +} + + + +@inproceedings{bcgw11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue}, +title = {Class of Trustworthy Pseudo Random Number Generators}, +booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet}, +pages = {72--77}, +address = {Luxembourg, Luxembourg}, +month = jun, +year = 2011, + +} + +@misc{chgw+14:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers}, +howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France}, +day = 23, +month = sep, +year = 2014, +} + + + + + +@inproceedings{aagp+15:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTIN}, +author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois}, +title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization}, +booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics}, +pages = {***--***}, +address = {Naples, Italy}, +day = 10, +month = sep, +year = 2015, +note = {To appear}, + +} + +@inproceedings{acgm+14:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques}, +title = {Finding the Core-Genes of Chloroplasts}, +booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science}, +pages = {357--364}, +series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics}, +number = {4(5)}, +doi = {10.7763/IJBBB.2014.V4.371}, +url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371}, +address = {Copenhagen, Denmark}, +day = 18, +month = jun, +year = 2014, + +} + + + + +@inproceedings{akgcs+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques}, +title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, +booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine}, +address = {Belfast, United Kingdom}, +day = 2, +month = nov, +year = 2014, +note = {Short paper}, +} + +@misc{acgs13:onp, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel}, +title = {Finding the core-genes of Chloroplast Species}, +howpublished = {Journ\'ees SeqBio 2013, Montpellier}, +month = nov, +year = 2013, + +} + + + + + +@PhdThesis{guyeuxphd, +author = {Guyeux, Christophe}, +title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique}, +type = {Th\`ese de {D}octorat}, +school = {LIFC, Universit\'e de Franche-Comt\'e}, +equipe = {AND}, +note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté}, +month = {13 décembre}, +year = 2010, + +} + +@inproceedings{chgw+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE}, +equipe = {ie}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Pseudorandom Number Generators with Balanced Gray Codes}, +booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, +pages = {469--475}, +address = {Vienna, Austria}, +month = aug, +date = aug, +year = 2014 +} + +@inproceedings{ccfg16:ip, +author = {Couchot, Jean-Fran\c{c}ois and + Couturier, Rapha\"el and Fadil, Yousra Ahmed and Guyeux, Christophe}, +title = {A Second Order Derivatives based Approach for Steganography}, +booktitle = {Secrypt 2016, 13th Int. Conf. on Security and Cryptography}, +pages = {424-431}, +address = {Lisbon}, +month = jul, +year = 2016 +} + + + + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -12,522 +1124,2279 @@ c% This file was created with JabRef 2.3.1. crossref = {DBLP:conf/cav/2002} } -@INPROCEEDINGS{CGK05, - author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, - title = {A uniform deductive approach for parameterized protocol safety}, - booktitle = {ASE}, - year = {2005}, - pages = {364-367}, - bibsource = {DBLP, http://dblp.uni-trier.de}, - crossref = {DBLP:conf/kbse/2005}, - ee = {http://doi.acm.org/10.1145/1101908.1101971} +@unpublished{Cha06, +author = {Nishanth Chandrasekaran}, +title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions}, +year = 2006, +} + +@InProceedings{GO01, + Author = "Gastin, P. and Oddoux, D.", + Title = "Fast {LTL} to {B{\"u}chi} Automata Translation", + BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)", + Publisher = "Springer", + Series = lncs, + Number = 2102, + Year = 2001, + Pages = "53--65" +} + +@inproceedings{cg04:np, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain}, +title = {Analyse d'atteignabilit\'e d\'eductive}, +booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04}, +pages = {269--283}, +editor = {Julliand, Jacques}, +address = {Besan\c{c}on, France}, +month = jun, +year = 2004, + +} + + +@article{cdgr03:ij, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {Scalable Automated Proving and Debugging of Set-Based Specifications}, +journal = {Journal of the Brazilian Computer Society (JBCS)}, +volume = 9, +number = 2, +pages = {17--36}, +url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf}, +month = nov, +year = 2003, +note = {ISSN 0104-6500}, + +} + + +@inproceedings{cddg+04:ip, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {vesontio}, +author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {Proving and Debugging Set-Based Specifications}, +booktitle = {WMF'03 proceedings}, +series = {ENTCS, Electronic Notes in Theoretical Computer Science}, +volume = 95, +pages = {189--208}, +editor = {A. Cavalcanti and P. Machado}, +address = {Campina Grande, Brazil}, +url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012}, +month = may, +year = 2004, + +} + + +@inproceedings{cdgr04:onp, +inhal = {no}, +author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.}, +title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}}, +pages = {369--372}, +booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, }, +address = {Besan\c{c}on, France}, +month = jun, +year = 2004, +editor = {Julliand, Jacques}, +note = {Session outils}, + +} + + +@INPROCEEDINGS{CGK05, + author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, + title = {A uniform deductive approach for parameterized protocol safety}, + booktitle = {ASE}, + year = {2005}, + pages = {364-367}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/kbse/2005}, + ee = {http://doi.acm.org/10.1145/1101908.1101971} +} + +@INPROCEEDINGS{abcvs05, + author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.}, + title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time + Dynamic Networks}, + booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms, + DCDIS'2005}, + year = {2005}, + pages = {524--529}, + address = {Guelph, Canada}, + month = jul, + note = {ISSN 1492-8760} +} + +@ARTICLE{Bah00, + author = {Bahi, J. M.}, + title = {Boolean totally asynchronous iterations}, + journal = ijma, + year = {2000}, + volume = {1}, + pages = {331--346} +} + +@ARTICLE{BCV06, + author = {Bahi, J. M. and Contassot-Vivier, S.}, + title = {Basins of attraction in fully asynchronous discrete-time discrete-state + dynamic networks}, + journal = TNN, + year = {2006}, + volume = {17}, + pages = {397-408}, + number = {2} +} + +@ARTICLE{bcv02, + author = {Bahi, J. M. and Contassot-Vivier, S.}, + title = {Stability of fully asynchronous discrete-time discrete-state dynamic + networks}, + journal = TNN, + year = {2002}, + volume = {13}, + pages = {1353--1363}, + number = {6} +} + + +@inproceedings{bcgr11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien}, +title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems}, +booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory}, +series = {LNCS}, +volume = 6914, +pages = {126--137}, +doi = {10.1007/978-3-642-22953-4_11}, +url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11}, +address = {Oslo, Norway}, +month = aug, +year = 2011, + +} + + + +@techreport{BCVC10:ir, + author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.}, + title = {Convergence Results of Combining Synchronism and Asynchronism for + Discrete-State Discrete-Time Dynamic Network}, + year = {2010}, + institution = {LIFC - Laboratoire d’{I}nformatique de + l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, + type = {Research Report}, + number = {RR2010-02}, + pdf = {/publis/papers/pub/2010/RR2010-02.pdf}, + month = may + } + +@techreport{Cou10:ir, + author = {Couchot, J.-F.}, + title = {Formal {C}onvergence {P}roof for {D}iscrete +{D}ynamical {S}ystems}, + institution = {LIFC - Laboratoire d’{I}nformatique de + l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, + type = {Research Report}, + number = {RR2010-03}, + pdf = {/publis/papers/pub/2010/RR2010-03.pdf}, + month = may, + year = 2010 + } + + + +@ARTICLE{BM00, + author = {Bahi, J. M. and Michel, C.}, + title = {Convergence of discrete asynchronous iterations}, + journal = {International Journal Computer Mathematics}, + year = {2000}, + volume = {74}, + pages = {113--125} +} + +@ARTICLE{BM99, + author = {Bahi, J. M. and Michel, C.}, + title = {Simulations of asynchronous evolution of discrete systems}, + journal = {Simulation Practice and Theory}, + year = {1999}, + volume = {7}, + pages = {309--324} +} + + +@ARTICLE{Bau78, + author = {G\'{e}rard M. Baudet}, + title = {Asynchronous Iterative Methods for Multiprocessors}, + journal = JACM, + year = {1978}, + volume = {25}, + pages = {226--244}, + number = {2}, + doi = {http://doi.acm.org/10.1145/322063.322067}, + issn = {0004-5411}, + publisher = {ACM} +} + +@BOOK{BT89, + title = {Parallel and distributed computation: numerical methods}, + publisher = prenticeHall, + year = {1989}, + author = {Dimitri P. Bertsekas and John N. Tsitsiklis}, + isbn = {0-13-648700-9} +} + +@ARTICLE{blast07, + author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar}, + title = {The software model checker Blast}, + journal = STTT, + year = {2007}, + volume = {9}, + pages = {505-525}, + number = {5-6} +} + +@INPROCEEDINGS{LeCun85, + author = {Y Le~Cun}, + title = {A learning scheme for threshold networks}, + booktitle = {Cognitiva'95}, + year = {1985}, + pages = {599--604}, + address = {Paris, France} +} + +@ARTICLE{Elm90, + author = {Jeffrey L. Elman}, + title = {Finding Structure in Time}, + journal = {Cognitive Science}, + year = {1990}, + volume = {14}, + pages = {179--211} +} + +@ARTICLE{FS00, + author = {Andreas Frommer and Daniel B. Szyld}, + title = {On asynchronous iterations}, + journal = JCAM, + year = {2000}, + volume = {123}, + pages = {201--216}, + number = {1-2}, + doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X}, + issn = {0377-0427}, + publisher = elsevier +} + +@ARTICLE{GS08, + author = {Goles Ch., E. and Salinas,L.}, + title = {Comparison between parallel and serial dynamics of Boolean networks}, + journal = tcs, + year = {2008}, + volume = {396}, + pages = {247--253}, + number = {1-3} +} + +@BOOK{Hol03, + title = {The SPIN Model Checker: Primer and Reference Manual}, + publisher = {Addison-Wesley, Pearson Education}, + year = {2003}, + author = {Gerard J. Holzmann} +} + +@ARTICLE{SH99, + author = {Shih M.-H. and Ho, J.-L.}, + title = {Solution of the Boolean Markus-Yamabe Problem}, + journal = advapplMath, + year = {1999}, + volume = {22}, + pages = {60 - 102}, + number = {1} +} + +@ARTICLE{Ric08, + author = {Adrien Richard}, + title = {An extension of a combinatorial fixed point theorem of Shih and Dong + }, + journal = advapplMath, + year = {2008}, + volume = {41}, + pages = {620--627}, + number = {4}, + publisher = elsevier +} + +@ARTICLE{RC07, + author = {Adrien Richard and Jean-Paul Comet}, + title = {Necessary conditions for multistationarity in discrete dynamical + systems}, + journal = discreteapplMath, + year = {2007}, + volume = {155}, + pages = {2403--2413}, + number = {18}, + issn = {0166-218X}, + publisher = elsevier +} + +@BOOK{Rob95, + title = {Les syst\`emes dynamiques discrets}, + publisher = springer, + year = {1995}, + author = {F. Robert}, + volume = {19}, + series = {Math\'ematiques et Applications} +} + +@ARTICLE{SD05, + author = {Shih, M.-H. and Dong J.-L.}, + title = {A combinatorial analogue of the Jacobian problem in automata networks}, + journal = advapplMath, + year = {2005}, + volume = {34}, + pages = {30 - 46}, + number = {1}, + issn = {0196-8858} +} + +@ARTICLE{Tho73, + author = {Thomas, R.}, + title = {Boolean Formalization of Genetic Control Circuits}, + journal = jtb, + year = {1973}, + volume = {42}, + pages = {563--585} +} + +@ARTICLE{WJBG98, + author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon}, + title = {Absence of Cycles in Symmetric Neural Networks}, + journal = NC, + year = {1998}, + volume = {10}, + pages = {1235-1249}, + number = {5}, + file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF} +} + +@PROCEEDINGS{DBLP:conf/cav/2002, + title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen, + Denmark, July 27-31, 2002, Proceedings}, + year = {2002}, + editor = {Ed Brinksma and Kim Guldstrand Larsen}, + volume = {2404}, + series = lncs, + publisher = springer, + booktitle = {CAV} +} + +@PROCEEDINGS{DBLP:conf/kbse/2005, + title = {20th IEEE/ACM International Conference on Automated Software Engineering + (ASE 2005), November 7-11, 2005, Long Beach, CA, USA}, + year = {2005}, + editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman}, + publisher = {ACM}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {ASE} +} + +@book{Mor08, + author = {Ben-Ari, Mordechai}, + year = {2008}, + title = {Principles of the Spin Model Checker}, + isbn = {1846287693, 9781846287695}}, + publisher = springer, + } + + +@INPROCEEDINGS{Wei97, + author = {Weise,Carsten}, + title = {An incremental formal semantics for {PROMELA}}, + booktitle = {SPIN97, the Third SPIN Workshop}, + year = {1997}, + pages = {} +} + +@PHDTHESIS{Couchot-PhD06, + AUTHOR = {Couchot, Jean-Fran\c{c}ois}, + TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par + superposition}, + MONTH = {avril}, + SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e}, + TYPE = {Th\`ese de {D}octorat}, + YEAR = {2006} +} + +@Article{dJGH04, + author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and + Page, M. and Tewfik, S. and Geiselmann, J.}, + title = {Qualitative simulation of genetic regulatory networks + using piecewise-linear models}, + journal = {Bull. Math. Biol.}, + year = {2004}, + OPTkey = {}, + volume = {66}, + number = {2}, + pages = {301--340}, + OPTmonth = {}, + OPTnote = {}, + OPTannote = {} +} + +@Article{BCRG04, + author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.}, + title = {A Fruitful Application of Formal Methods to Biological + Regulatory Networks: Extending {T}homas' Asynchronous + Logical Approach with Temporal Logic}, + journal = {J. Theor. Biol.}, + year = {2004}, + volume = {229}, + number = {3}, + pages = {339--347}, + EQUIPE = {bioinfo}, + KIND = {intrevue} +} + +@Article{GN06, + author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.}, + title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks}, + journal = {Biosystems}, + year = {2006}, + OPTkey = {}, + volume = {84}, + number = {2}, + pages = {91--100}, + OPTmonth = {}, + OPTnote = {}, + OPTannote = {} +} + +@Article{dJGH03, + author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and + Page, M.}, + title = {Genetic Network Analyzer: qualitative simulation + of genetic regulatory networks.}, + journal = {Bioinformatics}, + year = {2003}, + volume = {19}, + number = {3}, + pages = {336-44.} +} + +@Article{KCRB09, + author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.}, + title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks}, + journal = {Genes, Genomes and Genomics}, + year = {2009}, + OPTkey = {}, + volume = {3}, + number = {1}, + OPTpages = {15-22}, + OPTmonth = {}, + OPTnote = {}, + OPTannote = {} } -@INPROCEEDINGS{abcvs05, - author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.}, - title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time - Dynamic Networks}, - booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms, - DCDIS'2005}, - year = {2005}, - pages = {524--529}, - address = {Guelph, Canada}, +@article{ARBCR08, + author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien}, + title = {Analysing formal models of genetic regulatory networks with delays}, + journal = {Int. J. Bioinformatics Res. Appl.}, + volume = {4}, + number = {3}, + year = {2008}, + issn = {1744-5485}, + pages = {240--262}, + doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573}, + publisher = {Inderscience Publishers}, + address = {Inderscience Publishers, Geneva, SWITZERLAND}, + } +@TechReport{R09-c, + author = {Richard, A.}, + title = {Local negative circuits and fixed points in Boolean networks}, + institution = {preprint arXiv number 0910.0750}, + year = {2009}, + OPTkey = {}, + OPTtype = {}, + OPTnumber = {}, + OPTaddress = {}, + OPTmonth = {}, + OPTnote = {}, + OPTannote = {} +} + + +@ARTICLE{RRT08, + author = {Remy, R. and Ruet, P. and Thieffry, D.}, + title = {Graphic requirement for multistability and attractive cycles in a + Boolean dynamical framework}, + journal = {Advances in Applied Mathematics}, + year = {2008}, + volume = {41}, + pages = {335-350}, + number = {3}, + owner = {couchot}, + timestamp = {2009.02.05} +} + +@inproceedings{DBLP:conf/icann/BahiCMMS06, + author = {Jacques M. Bahi and + Sylvain Contassot-Vivier and + Libor Makovicka and + {\'E}ric Martin and + Marc Sauget}, + title = {Neural Network Based Algorithm for Radiation Dose Evaluation + in Heterogeneous Environments}, + booktitle = {ICANN (2)}, + year = {2006}, + pages = {777-787}, + ee = {http://dx.doi.org/10.1007/11840930_81}, + crossref = {DBLP:conf/icann/2006-2}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@proceedings{DBLP:conf/icann/2006-2, + editor = {Stefanos D. Kollias and + Andreas Stafylopatis and + Wlodzislaw Duch and + Erkki Oja}, + title = {Artificial Neural Networks - ICANN 2006, 16th International + Conference, Athens, Greece, September 10-14, 2006. Proceedings, + Part II}, + booktitle = {ICANN (2)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {4132}, + year = {2006}, + isbn = {3-540-38871-0}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + +@Book{Drey08, + author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie }, + ALTeditor = {}, + title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports}, + publisher = {Eyrolles}, + year = {2008}, + OPTkey = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + OPTedition = {}, + OPTmonth = {}, + OPTnote = {}, + OPTannote = {} +} + + + + + +@BOOK{Devaney, + title = {An Introduction to Chaotic Dynamical Systems}, + publisher = {Redwood City: Addison-Wesley}, + year = {1989}, + author = {R. L. Devaney}, + edition = {2nd}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + + +@article{cds13:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLI}, +impact-factor ={1.255}, +isi-acro = {MECHATRONICS}, +author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel}, +title = {Active {MEMS}-based flow control using artificial neural network}, +journal = {Mechatronics}, +volume = 23, +number = 7, +pages = {898--905}, +doi = {10.1016/j.mechatronics.2013.02.010}, +url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010}, +abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.}, +publisher = {Elsevier}, +month = oct, +year = 2013, +note = {Available online.} + +} + + +@inproceedings{cds12:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel}, +title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control}, +booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS}, +pages = {1--6}, +editor = {Bourgeois, Julien and de Labachelerie, Michel}, +address = {Besan\c{c}on, France}, +publisher = {IEEE CPS}, +month = apr, +year = 2012, + +} + + +@article{bcgs12:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLI}, +impact-factor ={2.081}, +isi-acro = {CHAOS}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel}, +title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network}, +journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science}, +volume = 22, +number = 1, +pages = {013122-1 -- 013122-9}, +doi = {10.1063/1.3685524}, +url = {http://dx.doi.org/10.1063/1.3685524}, +publisher = {American Institute of Physics}, +month = mar, +year = 2012, +note = {9 pages}, + +} + + +@inproceedings{bgs11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, +title = {Building a Chaotic Proven Neural Network}, +booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, +address = {Maldives, Maldives}, +month = may, +year = 2011, +} + +@ARTICLE{guyeux09, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLNI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#} +} + + + +@PHDTHESIS{GuyeuxThese10, + author = {Christophe Guyeux}, + title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} + en s\'{e}curit\'{e} informatique}, + school = {Universit\'{e} de Franche-Comt\'{e}}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@INPROCEEDINGS{gfb10:ip, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, + title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, + booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and + Multimedia Signal Processing}, + year = {2010}, + pages = {208--211}, + address = {Darmstadt, Germany}, + month = oct, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@ARTICLE{Adler65, + author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, + title = {Topological entropy}, + journal = {Transactions of the American Mathematical Society}, + year = {1965}, + volume = {114}, + pages = {309-319}, + owner = {guyeux}, + timestamp = {2008.05.29} +} + +@ARTICLE{Bowen, + author = {Rufus Bowen}, + title = {Entropy for group endomorphisms and homogeneous spaces}, + journal = {Transactions of the American Mathematical Society}, + year = {1971}, + volume = {153}, + pages = {401-414}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@article{10.1109/CIMSiM.2010.36, +author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, +title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, +volume = {0}, +year = {2010}, +pages = {15-20}, +doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} +@article{10.1109/ICME.2003.1221665, +author = {Liu Shaohui and Yao Hongxun and Gao Wen}, +title = {Neural network based steganalysis in still images}, +journal ={Multimedia and Expo, IEEE International Conference on}, +volume = {2}, +year = {2003}, +pages = {509-512}, +doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} + +@ARTICLE{Sullivan06steganalysisfor, + author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. }, + title = {Steganalysis for Markov cover data with applications to images}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2006}, + volume = {1}, + pages = {275--287} +} + + +@misc{Gray47, +year=1953, +author = "Gray, Frank", +title = "Pulse code communication", +note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} + + + + +@INPROCEEDINGS{guyeux10ter, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {A new chaos-based watermarking algorithm}, + booktitle = {SECRYPT'10, International Conference on Security +and Cryptography}, + year = {2010}, + pages = {455--458}, + address = {Athens, Greece}, month = jul, - note = {ISSN 1492-8760} + publisher = {SciTePress}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} } -@ARTICLE{Bah00, - author = {Bahi, J. M.}, - title = {Boolean totally asynchronous iterations}, - journal = ijma, - year = {2000}, - volume = {1}, - pages = {331--346} + +@inproceedings{Qiao:2009:SM:1704555.1704664, + author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong}, + title = {Steganalysis of MP3Stego}, + booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, + series = {IJCNN'09}, + year = {2009}, + location = {Atlanta, Georgia, USA}, + pages = {2723--2728}, + numpages = {6}, + publisher = {IEEE Press} +} + +@inproceedings{CouchotD07IFM, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric}, +title = {Guiding the Correction of Parameterized Specifications}, +booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods}, +pages = {176--194}, +series = {LNCS}, +volume = 4591, +publisher = {Springer}, +doi = {10.1007/978-3-540-73210-5_10}, +url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10}, +address = {Oxford, UK}, +month = jul, +year = 2007, + } -@ARTICLE{BCV06, - author = {Bahi, J. M. and Contassot-Vivier, S.}, - title = {Basins of attraction in fully asynchronous discrete-time discrete-state - dynamic networks}, - journal = TNN, - year = {2006}, - volume = {17}, - pages = {397-408}, - number = {2} +@inproceedings{couchot07FTP, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.}, +title = {A Graph-based Strategy for the Selection of Hypotheses}, +booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving}, +address = {Liverpool, UK}, +month = sep, +year = 2007, + } -@ARTICLE{bcv02, - author = {Bahi, J. M. and Contassot-Vivier, S.}, - title = {Stability of fully asynchronous discrete-time discrete-state dynamic - networks}, - journal = TNN, - year = {2002}, - volume = {13}, - pages = {1353--1363}, - number = {6} + +@inproceedings{cgs09:ip, +inhal = {inria}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {ACTI}, +author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas}, +title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions}, +abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.}, +affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} }, +booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)}, +publisher = {ACM Press}, +pages = {40--47}, +url = {http://arxiv.org/abs/0907.1357}, +otherUrl = {http://hal.inria.fr/inria-00402204}, +address = {Grenoble, France}, +editor = {Hassen Sa\"{i}di and N. Shankar}, +year = 2009, + +} + + + +@inproceedings{couchot07cade, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.}, +title = {Handling Polymorphism in Automated Deduction}, +booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction}, +pages = {263--278}, +series = {LNCS}, +volume = 4603, +publisher = {Springer}, +isbn = {978-3-540-73594-6}, +doi = {10.1007/978-3-540-73595-3_18}, +url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18}, +address = {Bremen, Germany}, +month = jul, +year = 2007, + +} + + + + + + + +@inproceedings{BCDG07, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {vesontio}, +classement = {ACTI}, +author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain}, +title = {Instantiation of Parameterized Data Structures for Model-Based Testing}, +booktitle = {B'2007, the 7th Int. B Conference}, +pages = {96--110}, +series = {LNCS}, +volume = 4355, +publisher = {Springer}, +doi = {10.1007/11955757_10}, +url = {http://dx.doi.org/10.1007/11955757_10}, +editor = {Julliand, Jacques and Kouchnarenko, Olga}, +address = {Besancon, France}, +month = jan, +year = 2007, + +} + + + +@article{byrd1995limited, + author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou}, + title = {A Limited Memory Algorithm for Bound Constrained Optimization}, + journal = {SIAM J. Sci. Comput.}, + issue_date = {Sept. 1995}, + volume = {16}, + number = {5}, + month = sep, + year = {1995}, + issn = {1064-8275}, + pages = {1190--1208}, + numpages = {19}, + url = {http://dx.doi.org/10.1137/0916069}, + doi = {10.1137/0916069}, + acmid = {210980}, + publisher = {Society for Industrial and Applied Mathematics}, + address = {Philadelphia, PA, USA}, + keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method}, +} + +@article{ANU:1770520, +author = {Powell,M. J. D.}, +title = {Direct search algorithms for optimization calculations}, +journal = {Acta Numerica}, +volume = {7}, +month = {1}, +year = {1998}, +issn = {1474-0508}, +pages = {287--336}, +numpages = {50}, +doi = {10.1017/S0962492900002841}, +URL = {http://journals.cambridge.org/article_S0962492900002841}, +} + +@article{Wang13, +year={2013}, +issn={0920-8542}, +journal={The Journal of Supercomputing}, +volume={64}, +number={3}, +doi={10.1007/s11227-010-0500-5}, +title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks}, +url={http://dx.doi.org/10.1007/s11227-010-0500-5}, +publisher={Springer US}, +keywords={Watermarking; Authentication; Wireless multimedia sensor network}, +author={Wang, Honggang}, +pages={883-897}, +language={English} +} + +@ARTICLE{HLG09, +author={Yifeng He and Lee, I. and Ling Guan}, +journal={Circuits and Systems for Video Technology, IEEE Transactions on}, +title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks}, +year={2009}, +volume={19}, +number={5}, +pages={704-718}, +keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, +doi={10.1109/TCSVT.2009.2017411}, +ISSN={1051-8215}} + +@ARTICLE{PM06, +author={Palomar, D.P. and Mung Chiang}, +journal={Selected Areas in Communications, IEEE Journal on}, +title={A tutorial on decomposition methods for network utility maximization}, +year={2006}, +volume={24}, +number={8}, +pages={1439-1451}, +keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, +doi={10.1109/JSAC.2006.879350}, +ISSN={0733-8716}} + +@article{HFD14, +year={2014}, +journal={EURASIP Journal on Information Security}, +eid={1}, +volume={2014}, +number={1}, +doi={10.1186/1687-417X-2014-1}, +title={Universal distortion function for steganography in an arbitrary domain}, +url={http://dx.doi.org/10.1186/1687-417X-2014-1}, +publisher={Springer International Publishing}, +author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, +language={English} } -@techreport{BCVC10:ir, - author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.}, - title = {Convergence Results of Combining Synchronism and Asynchronism for - Discrete-State Discrete-Time Dynamic Network}, - year = {2010}, - institution = {LIFC - Laboratoire d’{I}nformatique de - l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, - type = {Research Report}, - number = {RR2010-02}, - pdf = {/publis/papers/pub/2010/RR2010-02.pdf}, - month = may - } -@techreport{Cou10:ir, - author = {Couchot, J.-F.}, - title = {Formal {C}onvergence {P}roof for {D}iscrete -{D}ynamical {S}ystems}, - year = {2010}, - institution = {LIFC - Laboratoire d’{I}nformatique de - l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, - type = {Research Report}, - number = {RR2010-03}, - pdf = {/publis/papers/pub/2010/RR2010-03.pdf}, - month = may, - year = 2010 - } -@ARTICLE{BM00, - author = {Bahi, J. M. and Michel, C.}, - title = {Convergence of discrete asynchronous iterations}, - journal = {International Journal Computer Mathematics}, - year = {2000}, - volume = {74}, - pages = {113--125} +@inproceedings{conf/wifs/HolubF12, + added-at = {2013-01-23T00:00:00.000+0100}, + author = {Holub, Vojtech and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, + booktitle = {WIFS}, + crossref = {conf/wifs/2012}, + ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, + interhash = {cbef658a6868216eef585dd759ae0668}, + intrahash = {a685b4b8b521ac99734fb52c064ca994}, + isbn = {978-1-4673-2285-0}, + keywords = {dblp}, + pages = {234-239}, + publisher = {IEEE}, + timestamp = {2013-01-23T00:00:00.000+0100}, + title = {Designing steganographic distortion using directional filters.}, + url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12}, + year = 2012 } -@ARTICLE{BM99, - author = {Bahi, J. M. and Michel, C.}, - title = {Simulations of asynchronous evolution of discrete systems}, - journal = {Simulation Practice and Theory}, - year = {1999}, - volume = {7}, - pages = {309--324} +@proceedings{conf/wifs/2012, + title = {2012 {IEEE} International Workshop on Information Forensics and Security, + {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012}, + publisher = {{IEEE}}, + year = {2012}, + url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395850}, + isbn = {978-1-4673-2285-0}, + timestamp = {Wed, 23 Jan 2013 20:32:42 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/wifs/2012}, + bibsource = {dblp computer science bibliography, http://dblp.org} } -@ARTICLE{Bau78, - author = {G\'{e}rard M. Baudet}, - title = {Asynchronous Iterative Methods for Multiprocessors}, - journal = JACM, - year = {1978}, - volume = {25}, - pages = {226--244}, - number = {2}, - doi = {http://doi.acm.org/10.1145/322063.322067}, - issn = {0004-5411}, - publisher = {ACM} +@article{FillerJF11, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis + Codes}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {6}, + number = {3-2}, + year = {2011}, + pages = {920-935}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@BOOK{BT89, - title = {Parallel and distributed computation: numerical methods}, - publisher = prenticeHall, - year = {1989}, - author = {Dimitri P. Bertsekas and John N. Tsitsiklis}, - isbn = {0-13-648700-9} +@inproceedings{DBLP:conf/ih/PereiraVMMP01, + editor = {Ira S. Moskowitz}, + author = {Shelby Pereira and + Sviatoslav Voloshynovskiy and + Maribel Madueno and + St{\'e}phane Marchand-Maillet and + Thierry Pun}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + title = {Second Generation Benchmarking and Application Oriented + Evaluation}, + year = {2001}, + pages = {340-353}, + series = lncs, + publisher = springer, + address = springer_loc, + month = apr, + volume = {2137}, } -@ARTICLE{blast07, - author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar}, - title = {The software model checker Blast}, - journal = STTT, - year = {2007}, - volume = {9}, - pages = {505-525}, - number = {5-6} + +@inproceedings{DBLP:conf/ih/Westfeld01, + added-at = {2011-06-28T00:00:00.000+0200}, + author = {Westfeld, Andreas}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + editor = {Ira S. Moskowitz}, + pages = {289-302}, + publisher = springer, + address = springer_loc, + month=apr, + series = lncs, + title = {F5-A Steganographic Algorithm.}, + volume = 2137, + year = 2001 } -@INPROCEEDINGS{LeCun85, - author = {Y Le~Cun}, - title = {A learning scheme for threshold networks}, - booktitle = {Cognitiva'95}, - year = {1985}, - pages = {599--604}, - address = {Paris, France} + + + + +@article{Chang20101286, +title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", +journal = "Digital Signal Processing", +volume = "20", +number = "4", +pages = "1286 - 1307", +year = "2010", +note = "", +issn = "1051-2004", +doi = "10.1016/j.dsp.2009.11.005", +url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413", +author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le", +keywords = "Security", +keywords = "Wet paper coding", +keywords = "Steganography", +keywords = "Indicator", +keywords = "Fuzzy edge detector" } -@ARTICLE{Elm90, - author = {Jeffrey L. Elman}, - title = {Finding Structure in Time}, - journal = {Cognitive Science}, - year = {1990}, - volume = {14}, - pages = {179--211} + + +@article{Hu:2007:HPE:1282866.1282944, + author = {Hu, Liming and Cheng, H. D. and Zhang, Ming}, + title = {A high performance edge detector based on fuzzy inference rules}, + journal = {Inf. Sci.}, + issue_date = {November, 2007}, + volume = {177}, + number = {21}, + month = nov, + year = {2007}, + issn = {0020-0255}, + pages = {4768--4784}, + numpages = {17}, + url = {http://dx.doi.org/10.1016/j.ins.2007.04.001}, + doi = {10.1016/j.ins.2007.04.001}, + acmid = {1282944}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, +} + + +@inproceedings{Dumitrescu:2005:LSB:1073170.1073176, + author = {Sorina Dumitrescu and + Xiaolin Wu}, + editor = {Ahmet M. Eskicioglu and + Jessica J. Fridrich and + Jana Dittmann}, + title = {LSB steganalysis based on high-order statistics}, + booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, + MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, + year = {2005}, + publisher = {ACM}, + address = {New York, NY, USA}, + month=aug, + pages = {25-32}, + ee = {http://doi.acm.org/10.1145/1073170.1073176}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@ARTICLE{FS00, - author = {Andreas Frommer and Daniel B. Szyld}, - title = {On asynchronous iterations}, - journal = JCAM, - year = {2000}, - volume = {123}, - pages = {201--216}, - number = {1-2}, - doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X}, - issn = {0377-0427}, - publisher = elsevier +@inproceedings{DBLP:conf/ih/Ker05, + author = {Andrew D. Ker}, + title = {A General Framework for Structural Steganalysis of LSB Replacement}, + editor = {Mauro Barni and + Jordi Herrera-Joancomart\'{\i} and + Stefan Katzenbeisser and + Fernando P{\'e}rez-Gonz{\'a}lez}, + booktitle = {Information Hiding, 7th International Workshop, IH 2005, + Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, + year = {2005}, + pages = {296-311}, + ee = {http://dx.doi.org/10.1007/11558859_22}, + publisher = springer, + address = springer_loc, + month= jun, + series = lncs, + volume = {3727}, } -@ARTICLE{GS08, - author = {Goles Ch., E. and Salinas,L.}, - title = {Comparison between parallel and serial dynamics of Boolean networks}, - journal = tcs, - year = {2008}, - volume = {396}, - pages = {247--253}, - number = {1-3} + +@inproceedings{FK12, + editor = {Matthias Kirchner and + Dipak Ghosal}, + booktitle = {Information Hiding - 14th International Conference, IH 2012, + Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, + author = {Jessica J. Fridrich and + Jan Kodovsk{\'y}}, + title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, + month=may, + year = {2012}, + pages = {31-45}, + ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, + volume = {7692}, + publisher = springer, + address = springer_loc, + series = lncs, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@BOOK{Hol03, - title = {The SPIN Model Checker: Primer and Reference Manual}, - publisher = {Addison-Wesley, Pearson Education}, - year = {2003}, - author = {Gerard J. Holzmann} + +@article{DBLP:journals/tsp/DumitrescuWW03, + added-at = {2012-02-06T00:00:00.000+0100}, + author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe}, + biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp}, + ee = {http://dx.doi.org/10.1109/TSP.2003.812753}, + interhash = {f51bec0b4e4f8aba644eb0938018d2c6}, + intrahash = {556caad9b61980d3458885153a52321c}, + journal = {IEEE Transactions on Signal Processing}, + keywords = {dblp}, + number = 7, + pages = {1995-2007}, + timestamp = {2012-02-06T00:00:00.000+0100}, + title = {Detection of LSB steganography via sample pair analysis.}, + url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03}, + volume = 51, + year = 2003 } -@ARTICLE{SH99, - author = {Shih M.-H. and Ho, J.-L.}, - title = {Solution of the Boolean Markus-Yamabe Problem}, - journal = advapplMath, - year = {1999}, - volume = {22}, - pages = {60 - 102}, - number = {1} + + + +@inproceedings{DBLP:conf/mmsec/FridrichGD01, + editor = {Nicolas D. Georganas and + Radu Popescu-Zeletin}, + booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: + New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, + October 5, 2001}, + author = {Jessica J. Fridrich and + Miroslav Goljan and + Rui Du}, + title = {Reliable detection of LSB steganography in color and grayscale + images}, + year = {2001}, + pages = {27-30}, + ee = {http://doi.acm.org/10.1145/1232454.1232466}, + publisher = {ACM}, + address = {New York, NY, USA}, + month = oct, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@ARTICLE{Ric08, - author = {Adrien Richard}, - title = {An extension of a combinatorial fixed point theorem of Shih and Dong - }, - journal = advapplMath, - year = {2008}, - volume = {41}, - pages = {620--627}, - number = {4}, - publisher = elsevier + + + + +@inproceedings{DBLP:conf/ih/PevnyFB10, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Using High-Dimensional Image Models to Perform Highly Undetectable + Steganography}, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + booktitle = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + year = {2010}, + pages = {161-177}, + month=jun, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {6387}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@ARTICLE{RC07, - author = {Adrien Richard and Jean-Paul Comet}, - title = {Necessary conditions for multistationarity in discrete dynamical - systems}, - journal = discreteapplMath, - year = {2007}, - volume = {155}, - pages = {2403--2413}, - number = {18}, - issn = {0166-218X}, - publisher = elsevier + + + + +@Misc{Boss10, + OPTkey = {}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + + title = {Break Our Steganographic System}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2010}, + note = {Available at \url{http://www.agents.cz/boss/}}, + OPTannote = {} } -@BOOK{Rob95, - title = {Les syst\`emes dynamiques discrets}, +@proceedings{DBLP:conf/ih/2010, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + title = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + booktitle = {Information Hiding}, publisher = springer, - year = {1995}, - author = {F. Robert}, - volume = {19}, - series = {Math\'ematiques et Applications} + address = springer_loc, + series = lncs, + volume = {6387}, + year = {2010}, + isbn = {978-3-642-16434-7}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@ARTICLE{SD05, - author = {Shih, M.-H. and Dong J.-L.}, - title = {A combinatorial analogue of the Jacobian problem in automata networks}, - journal = advapplMath, - year = {2005}, - volume = {34}, - pages = {30 - 46}, - number = {1}, - issn = {0196-8858} -} -@ARTICLE{Tho73, - author = {Thomas, R.}, - title = {Boolean Formalization of Genetic Control Circuits}, - journal = jtb, - year = {1973}, - volume = {42}, - pages = {563--585} +@article{DBLP:journals/eswa/ChenCL10, + added-at = {2010-07-21T15:44:10.000+0200}, + author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan}, + biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp}, + date = {2010-05-03}, + ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050}, + interhash = {bc34a5f04661fee24ee62c39e76361be}, + intrahash = {28889a4ab329da28559f0910469f054b}, + journal = {Expert Systems with Applications}, + keywords = {dblp}, + number = 4, + pages = {3292-3301}, + timestamp = {2010-07-21T15:44:10.000+0200}, + title = {High payload steganography mechanism using hybrid edge detector.}, + url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10}, + volume = 37, + year = 2010 } -@ARTICLE{WJBG98, - author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon}, - title = {Absence of Cycles in Symmetric Neural Networks}, - journal = NC, - year = {1998}, - volume = {10}, - pages = {1235-1249}, - number = {5}, - file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF} +@article{DBLP:journals/tifs/FillerJF11, + added-at = {2011-09-29T00:00:00.000+0200}, + author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094}, + interhash = {b27d23ed0c9936d568e16c51378abccd}, + intrahash = {50e43c05a74eec17524b3df8db442da5}, + journal = {IEEE Transactions on Information Forensics and Security}, + keywords = {dblp}, + number = {3-2}, + pages = {920-935}, + timestamp = {2011-09-29T00:00:00.000+0200}, + title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.}, + url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11}, + volume = 6, + year = 2011 } -@PROCEEDINGS{DBLP:conf/cav/2002, - title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen, - Denmark, July 27-31, 2002, Proceedings}, - year = {2002}, - editor = {Ed Brinksma and Kim Guldstrand Larsen}, - volume = {2404}, + + + +@inproceedings{DBLP:conf/ih/KimDR06, + added-at = {2007-09-20T00:00:00.000+0200}, + author = {Kim, Younhee and Duric, Zoran and Richards, Dana}, + biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp}, + booktitle = {Information Hiding}, + crossref = {DBLP:conf/ih/2006}, + date = {2007-09-20}, + description = {dblp}, + editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil}, + ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21}, + interhash = {399aab122b39cfd6f6e951a1b276c786}, + intrahash = {f0324f70d62d9dfba568e393920aaa16}, + isbn = {978-3-540-74123-7}, + keywords = {dblp}, + pages = {314-327}, + month=jul, + publisher = springer, + address = springer_loc, series = lncs, + timestamp = {2007-09-20T00:00:00.000+0200}, + title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, + url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, + volume = 4437, + year = 2006 +} + + +@proceedings{DBLP:conf/ih/2006, + editor = {Jan Camenisch and + Christian S. Collberg and + Neil F. Johnson and + Phil Sallee}, + title = {Information Hiding, 8th International Workshop, IH 2006, + Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, + booktitle = {Information Hiding}, publisher = springer, - booktitle = {CAV} + address = springer_loc, + series = lncs, + volume = {4437}, + year = {2007}, + isbn = {978-3-540-74123-7}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@PROCEEDINGS{DBLP:conf/kbse/2005, - title = {20th IEEE/ACM International Conference on Automated Software Engineering - (ASE 2005), November 7-11, 2005, Long Beach, CA, USA}, - year = {2005}, - editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman}, + + +@inproceedings{DBLP:conf/mmsec/FridrichPK07, + author = {Jessica J. Fridrich and + Tom{\'a}s Pevn{\'y} and + Jan Kodovsk{\'y}}, + title = {Statistically undetectable jpeg steganography: dead ends + challenges, and opportunities}, + pages = {3-14}, + ee = {http://doi.acm.org/10.1145/1288869.1288872}, + editor = {Deepa Kundur and + Balakrishnan Prabhakaran and + Jana Dittmann and + Jessica J. Fridrich}, + booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, + MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, publisher = {ACM}, + address = {New York, NY, USA}, + month=sep, + year = {2007}, + isbn = {978-1-59593-857-2}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + +@inproceedings{DBLP:conf/mediaforensics/FillerJF10, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing embedding impact in steganography using trellis-coded + quantization}, + year = {2010}, + pages = {754105}, + ee = {http://dx.doi.org/10.1117/12.838002}, bibsource = {DBLP, http://dblp.uni-trier.de}, - booktitle = {ASE} + publisher = spie, + address = spie_loc, + month = jan, + series = {SPIE Proceedings}, + volume = {7541}, } -@book{Mor08, - author = {Ben-Ari, Mordechai}, - year = {2008}, - title = {Principles of the Spin Model Checker}, - isbn = {1846287693, 9781846287695}}, - publisher = springer, - } -@INPROCEEDINGS{Wei97, - author = {Weise,Carsten}, - title = {An incremental formal semantics for {PROMELA}}, - booktitle = {SPIN97, the Third SPIN Workshop}, - year = {1997}, - pages = {} + + + + + +@proceedings{DBLP:conf/mediaforensics/2010, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + title = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + booktitle = {Media Forensics and Security}, + publisher = spie, + address = spie_loc, + series = {SPIE Proceedings}, + volume = {7541}, + year = {2010}, + isbn = {978-0-8194-7934-1}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@PHDTHESIS{Couchot-PhD06, - AUTHOR = {Couchot, Jean-Fran\c{c}ois}, - TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par - superposition}, - MONTH = {avril}, - SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e}, - TYPE = {Th\`ese de {D}octorat}, - YEAR = {2006} +@article{DBLP:journals/corr/abs-1112-5239, + author = {Jacques M. Bahi and + Rapha{\"e}l Couturier and + Christophe Guyeux and + Pierre-Cyrille H{\'e}am}, + title = {Efficient and Cryptographically Secure Generation of Chaotic + Pseudorandom Numbers on GPU}, + journal = {CoRR}, + volume = {abs/1112.5239}, + year = {2011}, + ee = {http://arxiv.org/abs/1112.5239}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@Article{dJGH04, - author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and - Page, M. and Tewfik, S. and Geiselmann, J.}, - title = {Qualitative simulation of genetic regulatory networks - using piecewise-linear models}, - journal = {Bull. Math. Biol.}, - year = {2004}, +@Misc{psnrhvsm11, + author = {Ponomarenko, Nikolay}, + title = {PSNR-HVS-M page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}}, + OPTannote = {} +} + +@Misc{biqi11, OPTkey = {}, - volume = {66}, - number = {2}, - pages = {301--340}, + author = {Bovik, Alan C.}, + title = {BIQI page}, + OPThowpublished = {}, OPTmonth = {}, + year = {2011}, + note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}}, + OPTannote = {} +} + + +@InProceedings{PSECAL07, + author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir}, + title = {On between-coefficient contrast masking of DCT basis functions}, + booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA}, + OPTpages = {}, + year = {2007}, + editor = {Li,Baoxin}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + month = jan, + OPTorganization = {}, + OPTpublisher = {}, OPTnote = {}, OPTannote = {} } -@Article{BCRG04, - author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.}, - title = {A Fruitful Application of Formal Methods to Biological - Regulatory Networks: Extending {T}homas' Asynchronous - Logical Approach with Temporal Logic}, - journal = {J. Theor. Biol.}, - year = {2004}, - volume = {229}, - number = {3}, - pages = {339--347}, - EQUIPE = {bioinfo}, - KIND = {intrevue} + +@Article{MB10, + author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad}, + title = {A Two-Step Framework for Constructing Blind Image Quality Indices}, + journal = {IEEE Signal Processing Letters}, + year = {2010}, + volume = {17}, + number = {5}, + pages = {513--516}, + month = may, } -@Article{GN06, - author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.}, - title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks}, - journal = {Biosystems}, + + + +@inproceedings{DBLP:conf/crypto/ShubBB82, + author = {Lenore Blum and + Manuel Blum and + Mike Shub}, + title = {Comparison of Two Pseudo-Random Number Generators}, + editor = {David Chaum and + Ronald L. Rivest and + Alan T. Sherman}, + booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa + Barbara, California, USA, August 23-25, 1982}, + pages = {61-78}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + publisher = {Plenum Press}, + address={New York, NY, USA}, + month=aug, + year = {1983}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@inproceedings{Blum:1985:EPP:19478.19501, + booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa + Barbara, California, USA, August 19-22, 1984, Proceedings}, + author = {Manuel Blum and + Shafi Goldwasser}, + title = {An Efficient Probabilistic Public-Key Encryption Scheme + Which Hides All Partial Information}, + month=aug, + year = {1985}, + pages = {289-302}, + editor = {G. R. Blakley and + David Chaum}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {196} +} + + + +@article{DBLP:journals/ejisec/FontaineG07, + author = {Caroline Fontaine and + Fabien Galand}, + title = {A Survey of Homomorphic Encryption for Nonspecialists}, + journal = {EURASIP Journal on Information Security}, + volume = {2007}, + year = {2007}, + NUMBER = {1}, + PAGES = {013801}, + ee = {http://dx.doi.org/10.1155/2007/13801}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@article{Luo:2010:EAI:1824719.1824720, + author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, + title = {Edge adaptive image steganography based on LSB matching revisited}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + month = jun, + year = {2010}, + issn = {1556-6013}, + pages = {201--214}, + numpages = {14}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2041812}, + doi = {10.1109/TIFS.2010.2041812}, + acmid = {1824720}, + publisher = {IEEE Press}, + address = {Piscataway, NJ, USA}, + keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis}, +} + +@article{Mielikainen06, + author = {Mielikainen, J.}, + title = {LSB Matching Revisited}, + journal = {IEEE Signal Processing Letters}, year = {2006}, OPTkey = {}, - volume = {84}, - number = {2}, - pages = {91--100}, - OPTmonth = {}, + volume = {13}, + number = {5}, + pages = {285--287}, + month = may, OPTnote = {}, OPTannote = {} } -@Article{dJGH03, - author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and - Page, M.}, - title = {Genetic Network Analyzer: qualitative simulation - of genetic regulatory networks.}, - journal = {Bioinformatics}, - year = {2003}, - volume = {19}, - number = {3}, - pages = {336-44.} -} -@Article{KCRB09, - author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.}, - title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks}, - journal = {Genes, Genomes and Genomics}, - year = {2009}, + + + +@article{Liu:2008:FMP:1284917.1285196, + author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun}, + title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images}, + journal = {Pattern Recogn.}, + issue_date = {January, 2008}, + volume = {41}, + number = {1}, + month = jan, + year = {2008}, + issn = {0031-3203}, + pages = {56--66}, + numpages = {11}, + url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005}, + doi = {10.1016/j.patcog.2007.06.005}, + acmid = {1285196}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis}, +} + + + +@InProceedings{LHS08, + author = {Bin Li and Jiwu Huang and Yun Q. Shi}, + title = {Textural features based universal steganalysis}, + OPTcrossref = {}, OPTkey = {}, - volume = {3}, - number = {1}, - OPTpages = {15-22}, - OPTmonth = {}, + booktitle = {Proc. SPIE 6819}, + publisher = spie, + address = spie_loc, + pages = {12}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {6819}, + + OPTseries = {}, + OPTaddress = {}, + month = feb, + OPTorganization = {}, + OPTpublisher = {}, OPTnote = {}, OPTannote = {} } -@article{ARBCR08, - author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien}, - title = {Analysing formal models of genetic regulatory networks with delays}, - journal = {Int. J. Bioinformatics Res. Appl.}, - volume = {4}, - number = {3}, - year = {2008}, - issn = {1744-5485}, - pages = {240--262}, - doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573}, - publisher = {Inderscience Publishers}, - address = {Inderscience Publishers, Geneva, SWITZERLAND}, - } -@TechReport{R09-c, - author = {Richard, A.}, - title = {Local negative circuits and fixed points in Boolean networks}, - institution = {preprint arXiv number 0910.0750}, - year = {2009}, + +@InProceedings{KF11, + author = {Jan Kodovsk{\'y} and Jessica Fridrich}, + title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces}, + OPTcrossref = {}, OPTkey = {}, - OPTtype = {}, + booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII}, + publisher = spie, + address = spie_loc, + month=feb, + pages = {78800L-78800L-13}, + OPTpages = {}, + year = {2011}, + OPTeditor = {}, + OPTvolume = {}, OPTnumber = {}, + OPTseries = {}, OPTaddress = {}, OPTmonth = {}, + OPTorganization = {}, + OPTpublisher = {}, OPTnote = {}, OPTannote = {} } +@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10, + author = {Jan Kodovský and + Tomás Pevný and + Jessica J. Fridrich}, + title = {Modern steganalysis can detect YASS.}, + booktitle = {Media Forensics and Security}, + year = {2010}, + pages = {754102}, + ee = {http://dx.doi.org/10.1117/12.838768} +} -@ARTICLE{RRT08, - author = {Remy, R. and Ruet, P. and Thieffry, D.}, - title = {Graphic requirement for multistability and attractive cycles in a - Boolean dynamical framework}, - journal = {Advances in Applied Mathematics}, - year = {2008}, - volume = {41}, - pages = {335-350}, - number = {3}, - owner = {couchot}, - timestamp = {2009.02.05} +@article{DBLP:journals/tifs/KodovskyFH12, + author = {Jan Kodovsk{\'y} and + Jessica J. Fridrich and + Vojtech Holub}, + title = {Ensemble Classifiers for Steganalysis of Digital Media}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {7}, + number = {2}, + year = {2012}, + pages = {432-444}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919}, + bibsource = {DBLP, http://dblp.uni-trier.de} } -@inproceedings{DBLP:conf/icann/BahiCMMS06, - author = {Jacques M. Bahi and - Sylvain Contassot-Vivier and - Libor Makovicka and - {\'E}ric Martin and - Marc Sauget}, - title = {Neural Network Based Algorithm for Radiation Dose Evaluation - in Heterogeneous Environments}, - booktitle = {ICANN (2)}, - year = {2006}, - pages = {777-787}, - ee = {http://dx.doi.org/10.1007/11840930_81}, - crossref = {DBLP:conf/icann/2006-2}, + + +@article{Fillatre:2012:ASL:2333143.2333587, + author = {Fillatre, Lionel}, + title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images}, + journal = {IEEE Transactions on Signal Processing}, + year = {2012}, + volume = {60}, + number = {2}, + month = feb, + issn = {1053-587X}, + pages = {556--569}, + numpages = {14}, + url = {http://dx.doi.org/10.1109/TSP.2011.2174231}, + doi = {10.1109/TSP.2011.2174231}, + acmid = {2333587}, + publisher = {IEEE Press}, + address = {Piscataway, NJ, USA}, +} + + +@inproceedings{Tyan1993, + abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}}, + address = ieecs_loc, + publisher=ieecs, + author = {Tyan, C. Y. and Wang, P. P.}, + booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}}, + citeulike-article-id = {7936501}, + keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory}, + pages = {600--605}, + posted-at = {2010-10-01 17:27:48}, + priority = {0}, + month=apr, + title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}}, + volume = {1}, + year = {1993} +} + + +@article{Canny:1986:CAE:11274.11275, + author = {Canny, J}, + title = {A Computational Approach to Edge Detection}, + journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, + issue_date = {June 1986}, + volume = {PAMI-8}, + number = {6}, + month = jun, + year = {1986}, + issn = {0162-8828}, + pages = {679--698}, + numpages = {20}, + url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851}, + doi = {10.1109/TPAMI.1986.4767851}, + acmid = {11275}, + publisher = {IEEE Computer Society}, + address = {Washington, DC, USA}, + keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis}, +} + + +@inproceedings{DBLP:conf/ih/FridrichKHG11a, + author = {Jessica J. Fridrich and + Jan Kodovsk{\'y} and + Vojtech Holub and + Miroslav Goljan}, + title = {Steganalysis of Content-Adaptive Steganography in Spatial + Domain}, + booktitle = {Information Hiding}, + year = {2011}, + pages = {102-117}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8}, + crossref = {DBLP:conf/ih/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/ih/2011, + editor = {Tom{\'a}s Filler and + Tom{\'a}s Pevn{\'y} and + Scott Craver and + Andrew D. Ker}, + title = {Information Hiding - 13th International Conference, IH 2011, + Prague, Czech Republic, May 18-20, 2011, Revised Selected + Papers}, + booktitle = {Information Hiding}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {6958}, + year = {2011}, + isbn = {978-3-642-24177-2}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } -@proceedings{DBLP:conf/icann/2006-2, - editor = {Stefanos D. Kollias and - Andreas Stafylopatis and - Wlodzislaw Duch and - Erkki Oja}, - title = {Artificial Neural Networks - ICANN 2006, 16th International - Conference, Athens, Greece, September 10-14, 2006. Proceedings, - Part II}, - booktitle = {ICANN (2)}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {4132}, - year = {2006}, - isbn = {3-540-38871-0}, +@inproceedings{DBLP:conf/iwdw/Fridrich11, + author = {Jessica J. Fridrich}, + title = {Modern Trends in Steganography and Steganalysis}, + booktitle = {IWDW}, + year = {2011}, + pages = {1}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1}, + crossref = {DBLP:conf/iwdw/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/iwdw/2011, + editor = {Yun-Qing Shi and + Hyoung-Joong Kim and + Fernando P{\'e}rez-Gonz{\'a}lez}, + title = {Digital Forensics and Watermarking - 10th International + Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, + 2011, Revised Selected Papers}, + booktitle = {IWDW}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {7128}, + year = {2012}, + isbn = {978-3-642-32204-4}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } -@Book{Drey08, - author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie }, - ALTeditor = {}, - title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports}, - publisher = {Eyrolles}, - year = {2008}, + +@InProceedings{kcm16:ip, + author = {Khernane, N. and Couchot, J.-F. and Mostefaoui, A.}, + title = {Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints}, + OPTcrossref = {}, OPTkey = {}, + booktitle = {MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access}, + year = {2016}, + OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, + OPTpages = {}, + month = nov, OPTaddress = {}, - OPTedition = {}, - OPTmonth = {}, + OPTorganization = {}, + OPTpublisher = {}, OPTnote = {}, OPTannote = {} } +@article{MCErlang07, + author = {Fredlund, Lars-Ake and Svensson, Hans}, + title = {McErlang: a model checker for a distributed functional programming language}, + journal = {SIGPLAN Not.}, + volume = {42}, + issue = {9}, + year = {2007}, + issn = {0362-1340}, + pages = {125--136}, + numpages = {12}, + publisher = {ACM}, +} +@inproceedings{Bogor03, + author = {Robby and + Matthew B. Dwyer and + John Hatcliff}, + title = {Bogor: an extensible and highly-modular software model checking + framework}, + booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations + of Software Engineering 2003}, + publisher = {ACM}, + year = {2003}, + pages = {267-276}, +} - - -@BOOK{Dev89, - title = {An Introduction to Chaotic Dynamical Systems}, - publisher = {Redwood City: Addison-Wesley}, - year = {1989}, - author = {R. L. Devaney}, - edition = {2nd}, +@ARTICLE{Banks92, + author = {Banks, John and J. Brooks and G. Cairns and P. Stacey}, + title = {On Devaney's Definition of Chaos}, + journal = {Amer. Math. Monthly}, + year = {1992}, + volume = {99}, + pages = {332--334}, + keywords = {(c+),}, owner = {guyeux}, timestamp = {27/01/2008} } +@article{Crook2007267, +title = "Pattern recall in networks of chaotic neurons", +journal = "Biosystems", +volume = "87", +number = "2-3", +pages = "267 - 274", +year = "2007", +issn = "0303-2647", +doi = "DOI: 10.1016/j.biosystems.2006.09.022", +author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat", +keywords = "Chaos", +keywords = "Spiking neural network" +} -@article{byrd1995limited, - abstract = {An algorithm for solving large nonlinear optimization problems with simple bounds is described. It is based on the gradient projection method and uses a limited memory BFGS matrix to approximate the Hessian of the objective function. It is shown how to take advantage of the form of the limited memory approximation to implement the algorithm efficiently. The results of numerical tests on a set of large problems are reported.}, - added-at = {2012-09-21T02:02:46.000+0200}, - author = {Byrd, R. and Lu, P. and Nocedal, J. and Zhu, C.}, - biburl = {http://www.bibsonomy.org/bibtex/2c7605a5d75473a64f24fb02d2a0a8281/peter.ralph}, - doi = {10.1137/0916069}, - eprint = {http://epubs.siam.org/doi/pdf/10.1137/0916069}, - interhash = {5b3e191b77610d28f48a64125fbd050b}, - intrahash = {c7605a5d75473a64f24fb02d2a0a8281}, - journal = {SIAM Journal on Scientific Computing}, - keywords = {methods optimization original}, - number = 5, - pages = {1190-1208}, - timestamp = {2012-09-21T02:02:46.000+0200}, - title = {A Limited Memory Algorithm for Bound} +@ARTICLE{Xiao10, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + year = {2010}, + pages = {1-9}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing + China}, + issn = {0941-0643}, + keyword = {Computer Science}, + publisher = {Springer London} } -@article{ANU:1770520, -author = {Powell,M. J. D.}, -title = {Direct search algorithms for optimization calculations}, -journal = {Acta Numerica}, -volume = {7}, -month = {1}, -year = {1998}, -issn = {1474-0508}, -pages = {287--336}, -numpages = {50}, -doi = {10.1017/S0962492900002841}, -URL = {http://journals.cambridge.org/article_S0962492900002841}, +@ARTICLE{1309431, +author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.}, +journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography}, +year={2004}, +month=may, +volume={50}, +number={2}, +pages={ 587 - 590}, +keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, +doi={10.1109/TCE.2004.1309431}, +} + +@article{Zhang2005759, +title = "An image encryption approach based on chaotic maps", +journal = "Chaos, Solitons \& Fractals", +volume = "24", +number = "3", +pages = "759 - 765", +year = "2005", +note = "", +issn = "0960-0779", +doi = "10.1016/j.chaos.2004.09.035", +author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang" +} + +@article{Lian20091296, +title = "A block cipher based on chaotic neural networks", +journal = "Neurocomputing", +volume = "72", +number = "4-6", +pages = "1296 - 1301", +year = "2009", +issn = "0925-2312", +author = "Shiguo Lian", +keywords = "Neural network", +keywords = "Chaos", +keywords = "Security", +keywords = "Block cipher", +keywords = "Image encryption" +} + +@article{Cybenko89, + author = {George Cybenko}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, + year = {1989}, + pages = {303-314} +} + + +@article{DBLP:journals/nn/HornikSW89, + author = {Kurt Hornik and + Maxwell B. Stinchcombe and + Halbert White}, + title = {Multilayer feedforward networks are universal approximators}, + journal = {Neural Networks}, + volume = {2}, + number = {5}, + year = {1989}, + pages = {359-366}, + ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{dalkiran10, + author = {Ilker Dalkiran and Kenan Danisman}, + affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey}, + title = {Artificial neural network based chaotic generator for cryptology}, + journal = TESC, + volume = {18}, + number = {2}, + pages = {225-240}, + year = {2010} +} + +@article{springerlink:10.1007/s00521-010-0432-2, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing China}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + publisher = {Springer}, + issn = {0941-0643}, + keyword = {Computer Science}, + pages = {1-9}, + year = {2010} +} + + + +@article{Feder2009NTB, + author = {Feder, Tom\'{a}s and Subi, Carlos}, + title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations}, + journal = {Inf. Process. Lett.}, + issue_date = {February, 2009}, + volume = {109}, + number = {5}, + month = feb, + year = {2009}, + issn = {0020-0190}, + pages = {267--272}, + numpages = {6}, + url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015}, + doi = {10.1016/j.ipl.2008.10.015}, + acmid = {1496515}, + publisher = {Elsevier North-Holland, Inc.}, + address = {Amsterdam, The Netherlands, The Netherlands}, + keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings}, +} + + + +@Article{ZanSup04, + author={Zanten, A.~J.~van and Suparta, I.~N.}, + title={ Totally balanced and exponentially balanced Gray codes}, + journal={Discrete Analysis and Operational Research}, + series={Ser.~1}, + year={2004}, + volume={11}, + issue={4}, + pages={81--98} +} + +@book{LevinPeresWilmer2006, + added-at = {2010-01-19T17:51:27.000+0100}, + author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.}, + biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg}, + interhash = {61354795a6accb6407bfdbf04753a683}, + intrahash = {097dc4d1d0e412b2444f540b04110797}, + keywords = {markovchains probabilitytheory textbook}, + publisher = {American Mathematical Society}, + timestamp = {2010-01-19T17:51:27.000+0100}, + title = {{Markov chains and mixing times}}, + url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0}, + year = 2006 +} + + @Book{proba, + author = {M. Mitzenmacher and Eli Upfal}, + ALTeditor = {}, + title = {Probability and Computing}, + publisher = {Cambridge University Press}, + year = {2005}, +} + +@misc{Mons14, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers}, +howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France}, +day = 23, +month = sep, +year = 2014, + +} +@article{Robinson:1981:CS, + author = {Robinson, John P. and Cohn, Martin}, + title = {Counting Sequences}, + journal = {IEEE Trans. Comput.}, + issue_date = {January 1981}, + volume = {30}, + number = {1}, + month = jan, + year = {1981}, + issn = {0018-9340}, + pages = {17--23}, + numpages = {7}, + url = {http://dl.acm.org/citation.cfm?id=1963620.1963622}, + acmid = {1963622}, + publisher = {IEEE Computer Society}, + address = {Washington, DC, USA}, + keywords = {circuit testing, counters, gray codes, hamming distance, transition counts, uniform distance}, +} +@article{DBLP:journals/combinatorics/BhatS96, + author = {Girish S. Bhat and + Carla D. Savage}, + title = {Balanced Gray Codes}, + journal = {Electr. J. Comb.}, + volume = {3}, + number = {1}, + year = {1996}, + url = {http://www.combinatorics.org/Volume_3/Abstracts/v3i1r25.html}, + timestamp = {Tue, 05 Oct 2004 14:51:02 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/combinatorics/BhatS96}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + + +@inproceedings{DBLP:conf/secrypt/MohammedCG16, + author = {Bakiri, Mohammed and + Couchot, Jean{-}Fran{\c{c}}ois and + Guyeux, Christophe }, + title = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators + based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study}, + booktitle = {Proceedings of the 13th International Joint Conference on e-Business + and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, + Portugal, July 26-28, 2016.}, + pages = {302--309}, + year = {2016}, + crossref = {DBLP:conf/secrypt/2016}, + url = {http://dx.doi.org/10.5220/0005967903020309}, + doi = {10.5220/0005967903020309}, + timestamp = {Tue, 13 Sep 2016 14:32:10 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/MohammedCG16}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@proceedings{DBLP:conf/secrypt/2016, + editor = {Christian Callegari and + Marten van Sinderen and + Panagiotis G. Sarigiannidis and + Pierangela Samarati and + Enrique Cabello and + Pascal Lorenz and + Mohammad S. Obaidat}, + title = {Proceedings of the 13th International Joint Conference on e-Business + and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, + Portugal, July 26-28, 2016}, + publisher = {SciTePress}, + year = {2016}, + isbn = {978-989-758-196-0}, + timestamp = {Tue, 13 Sep 2016 14:32:10 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2016}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@article{ccgh16, + author = {Sylvain Contassot{-}Vivier and + Jean{-}Fran{\c{c}}ois Couchot and + Christophe Guyeux and + Pierre{-}Cyrille H{\'{e}}am}, + title = {Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom + Number Generation: Theoretical and Practical Considerations}, + journal = {I. J. Bifurcation and Chaos}, + volume = {27}, + number = {1}, + pages = {1--18}, + year = {2017}, + url = {https://doi.org/10.1142/S0218127417500146}, + doi = {10.1142/S0218127417500146}, + timestamp = {Fri, 26 May 2017 22:50:42 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/ijbc/Contassot-Vivier17}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + + +@article{Khan2014251, +title = "A recent survey of reversible watermarking techniques ", +journal = "Information Sciences ", +volume = "279", +number = "", +pages = "251 - 272", +year = "2014", +note = "", +issn = "0020-0255", +doi = "http://dx.doi.org/10.1016/j.ins.2014.03.118", +url = "http://www.sciencedirect.com/science/article/pii/S0020025514004150", +author = "Asifullah Khan and Ayesha Siddiqa and Summuyya Munib and Sana Ambreen Malik", +keywords = "Information hiding", +keywords = "Histogram processing", +keywords = "Reversible watermarking", +keywords = "Error expansion", +keywords = "Quantization", +keywords = "Prediction error ", +abstract = "Abstract The art of secretly hiding and communicating information has gained immense importance in the last two decades due to the advances in generation, storage, and communication technology of digital content. Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, watermarking can cause damage to the sensitive information present in the cover work. Therefore, at the receiving end, the exact recovery of cover work may not be possible. Additionally, there exist certain applications that may not tolerate even small distortions in cover work prior to the downstream processing. In such applications, reversible watermarking instead of conventional watermarking is employed. Reversible watermarking of digital content allows full extraction of the watermark along with the complete restoration of the cover work. For the last few years, reversible watermarking techniques are gaining popularity because of its increasing applications in some important and sensitive areas, i.e., military communication, healthcare, and law-enforcement. Due to the rapid evolution of reversible watermarking techniques, a latest review of recent research in this field is highly desirable. In this survey, the performances of different reversible watermarking schemes are discussed on the basis of various characteristics of watermarking. However, the major focus of this survey is on prediction-error expansion based reversible watermarking techniques, whereby the secret information is hidden in the prediction domain through error expansion. Comparison of the different reversible watermarking techniques is provided in tabular form, and an analysis is carried out. Additionally, experimental comparison of some of the recent reversible watermarking techniques, both in terms of watermarking properties and computational time, is provided on a dataset of 300 images. Future directions are also provided for this potentially important field of watermarking. " +} + + + + +@inproceedings{DBLP:conf/automata/Contassot-Vivier17, + author = {Sylvain Contassot{-}Vivier and + Jean{-}Fran{\c{c}}ois Couchot}, + title = {Canonical Form of Gray Codes in N-cubes}, + booktitle = {Cellular Automata and Discrete Complex Systems - 23rd {IFIP} {WG} + 1.5 International Workshop, {AUTOMATA} 2017, Milan, Italy, June 7-9, + 2017, Proceedings}, + pages = {68--80}, + year = {2017}, + crossref = {DBLP:conf/automata/2017}, + url = {https://doi.org/10.1007/978-3-319-58631-1_6}, + doi = {10.1007/978-3-319-58631-1_6}, + timestamp = {Wed, 24 May 2017 10:11:43 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/automata/Contassot-Vivier17}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@proceedings{DBLP:conf/automata/2017, + editor = {Alberto Dennunzio and + Enrico Formenti and + Luca Manzoni and + Antonio E. Porreca}, + title = {Cellular Automata and Discrete Complex Systems - 23rd {IFIP} {WG} + 1.5 International Workshop, {AUTOMATA} 2017, Milan, Italy, June 7-9, + 2017, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {10248}, + publisher = {Springer}, + year = {2017}, + url = {https://doi.org/10.1007/978-3-319-58631-1}, + doi = {10.1007/978-3-319-58631-1}, + isbn = {978-3-319-58630-4}, + timestamp = {Wed, 24 May 2017 10:11:10 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/automata/2017}, + bibsource = {dblp computer science bibliography, http://dblp.org} } +@inproceedings{DBLP:conf/secrypt/BakiriCG17, + author = {Mohammed Bakiri and + Jean{-}Fran{\c{c}}ois Couchot and + Christophe Guyeux}, + title = {One Random Jump and One Permutation: Sufficient Conditions to Chaotic, + Statistically Faultless, and Large Throughput {PRNG} for {FPGA}}, + booktitle = {Proceedings of the 14th International Joint Conference on e-Business + and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, + Spain, July 24-26, 2017.}, + pages = {295--302}, + year = {2017}, + crossref = {DBLP:conf/secrypt/2017}, + url = {https://doi.org/10.5220/0006418502950302}, + doi = {10.5220/0006418502950302}, + timestamp = {Thu, 17 Aug 2017 18:36:09 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/BakiriCG17}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} +@proceedings{DBLP:conf/secrypt/2017, + editor = {Pierangela Samarati and + Mohammad S. Obaidat and + Enrique Cabello}, + title = {Proceedings of the 14th International Joint Conference on e-Business + and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, + Spain, July 24-26, 2017}, + publisher = {SciTePress}, + year = {2017}, + isbn = {978-989-758-259-2}, + timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, + biburl = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2017}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} +@ARTICLE{BCG17IEEE, +author={M. Bakiri and J. F. Couchot and C. Guyeux}, +journal={IEEE Transactions on Circuits and Systems I: Regular Papers}, +title={CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for F2; Linear Pseudorandom Number Generation Based on Zynq MPSoC}, +year={2017}, +volume={PP}, +number={99}, +pages={1-14}, +keywords={FPGA.;Pseudorandom number generators;applied cryptography;discrete dynamical systems;hardware security;statistical tests;system on chip}, +doi={10.1109/TCSI.2017.2754650}, +ISSN={1549-8328}, +month={} +} \ No newline at end of file