X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/9aadb3604ef52f836ecadc9d6241da6909553e8c..78c3750f579c5f7489ee74661e9aebd336777a65:/bib/biblioand.bib diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 1dc7a4b..702a945 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,45 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + +@InProceedings{, + author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot, +Michel Salomon, Jacques M Bahi}, + title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)}, + OPTyear = {2014}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {***--***}, + month = nov, + address = {Belfast, UK}, + OPTorganization = {}, + publisher = {IEE }, + note = {To appear}, + OPTannote = {} +} + +@inproceedings{chgw+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE}, +equipe = {ie}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Pseudorandom Number Generators with Balanced Gray Codes}, +booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, +pages = {469--475}, +address = {Vienna, Austria}, +month = aug, +date = aug, +year = 2014 +} + + + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -12,6 +51,23 @@ c% This file was created with JabRef 2.3.1. crossref = {DBLP:conf/cav/2002} } +@unpublished{Cha06, +author = {Nishanth Chandrasekaran}, +title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions}, +year = 2006, +} + +@InProceedings{GO01, + Author = "Gastin, P. and Oddoux, D.", + Title = "Fast {LTL} to {B{\"u}chi} Automata Translation", + BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)", + Publisher = "Springer", + Series = lncs, + Number = 2102, + Year = 2001, + Pages = "53--65" +} + @INPROCEEDINGS{CGK05, author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, title = {A uniform deductive approach for parameterized protocol safety}, @@ -84,7 +140,6 @@ c% This file was created with JabRef 2.3.1. author = {Couchot, J.-F.}, title = {Formal {C}onvergence {P}roof for {D}iscrete {D}ynamical {S}ystems}, - year = {2010}, institution = {LIFC - Laboratoire d’{I}nformatique de l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, type = {Research Report}, @@ -485,7 +540,7 @@ c% This file was created with JabRef 2.3.1. -@BOOK{Dev89, +@BOOK{Devaney, title = {An Introduction to Chaotic Dynamical Systems}, publisher = {Redwood City: Addison-Wesley}, year = {1989}, @@ -496,23 +551,304 @@ c% This file was created with JabRef 2.3.1. } -@article{byrd1995limited, - abstract = {An algorithm for solving large nonlinear optimization problems with simple bounds is described. It is based on the gradient projection method and uses a limited memory BFGS matrix to approximate the Hessian of the objective function. It is shown how to take advantage of the form of the limited memory approximation to implement the algorithm efficiently. The results of numerical tests on a set of large problems are reported.}, - added-at = {2012-09-21T02:02:46.000+0200}, - author = {Byrd, R. and Lu, P. and Nocedal, J. and Zhu, C.}, - biburl = {http://www.bibsonomy.org/bibtex/2c7605a5d75473a64f24fb02d2a0a8281/peter.ralph}, - doi = {10.1137/0916069}, - eprint = {http://epubs.siam.org/doi/pdf/10.1137/0916069}, - interhash = {5b3e191b77610d28f48a64125fbd050b}, - intrahash = {c7605a5d75473a64f24fb02d2a0a8281}, - journal = {SIAM Journal on Scientific Computing}, - keywords = {methods optimization original}, - number = 5, - pages = {1190-1208}, - timestamp = {2012-09-21T02:02:46.000+0200}, - title = {A Limited Memory Algorithm for Bound} +@article{bcgs12:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLI}, +impact-factor ={2.081}, +isi-acro = {CHAOS}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel}, +title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network}, +journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science}, +volume = 22, +number = 1, +pages = {013122-1 -- 013122-9}, +doi = {10.1063/1.3685524}, +url = {http://dx.doi.org/10.1063/1.3685524}, +publisher = {American Institute of Physics}, +month = mar, +year = 2012, +note = {9 pages}, + } + +@inproceedings{bgs11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, +title = {Building a Chaotic Proven Neural Network}, +booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, +address = {Maldives, Maldives}, +month = may, +year = 2011, +} + +@ARTICLE{guyeux09, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLNI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#} +} + + + +@PHDTHESIS{GuyeuxThese10, + author = {Christophe Guyeux}, + title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} + en s\'{e}curit\'{e} informatique}, + school = {Universit\'{e} de Franche-Comt\'{e}}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@INPROCEEDINGS{gfb10:ip, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, + title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, + booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and + Multimedia Signal Processing}, + year = {2010}, + pages = {208--211}, + address = {Darmstadt, Germany}, + month = oct, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@ARTICLE{Adler65, + author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, + title = {Topological entropy}, + journal = {Transactions of the American Mathematical Society}, + year = {1965}, + volume = {114}, + pages = {309-319}, + owner = {guyeux}, + timestamp = {2008.05.29} +} + +@ARTICLE{Bowen, + author = {Rufus Bowen}, + title = {Entropy for group endomorphisms and homogeneous spaces}, + journal = {Transactions of the American Mathematical Society}, + year = {1971}, + volume = {153}, + pages = {401-414}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@article{10.1109/CIMSiM.2010.36, +author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, +title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, +volume = {0}, +year = {2010}, +pages = {15-20}, +doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} +@article{10.1109/ICME.2003.1221665, +author = {Liu Shaohui and Yao Hongxun and Gao Wen}, +title = {Neural network based steganalysis in still images}, +journal ={Multimedia and Expo, IEEE International Conference on}, +volume = {2}, +year = {2003}, +pages = {509-512}, +doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} + +@ARTICLE{Sullivan06steganalysisfor, + author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. }, + title = {Steganalysis for Markov cover data with applications to images}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2006}, + volume = {1}, + pages = {275--287} +} + + +@misc{Gray47, +year=1953, +author = "Gray, Frank", +title = "Pulse code communication", +note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} + + + + +@INPROCEEDINGS{guyeux10ter, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {A new chaos-based watermarking algorithm}, + booktitle = {SECRYPT'10, International Conference on Security +and Cryptography}, + year = {2010}, + pages = {455--458}, + address = {Athens, Greece}, + month = jul, + publisher = {SciTePress}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@inproceedings{Qiao:2009:SM:1704555.1704664, + author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong}, + title = {Steganalysis of MP3Stego}, + booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, + series = {IJCNN'09}, + year = {2009}, + location = {Atlanta, Georgia, USA}, + pages = {2723--2728}, + numpages = {6}, + publisher = {IEEE Press} +} + +@inproceedings{CouchotD07IFM, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric}, +title = {Guiding the Correction of Parameterized Specifications}, +booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods}, +pages = {176--194}, +series = {LNCS}, +volume = 4591, +publisher = {Springer}, +doi = {10.1007/978-3-540-73210-5_10}, +url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10}, +address = {Oxford, UK}, +month = jul, +year = 2007, + +} + +@inproceedings{couchot07FTP, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.}, +title = {A Graph-based Strategy for the Selection of Hypotheses}, +booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving}, +address = {Liverpool, UK}, +month = sep, +year = 2007, + +} + + +@inproceedings{cgs09:ip, +inhal = {inria}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {ACTI}, +author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas}, +title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions}, +abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.}, +affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} }, +booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)}, +publisher = {ACM Press}, +pages = {40--47}, +url = {http://arxiv.org/abs/0907.1357}, +otherUrl = {http://hal.inria.fr/inria-00402204}, +address = {Grenoble, France}, +editor = {Hassen Sa\"{i}di and N. Shankar}, +year = 2009, + +} + + + +@inproceedings{couchot07cade, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.}, +title = {Handling Polymorphism in Automated Deduction}, +booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction}, +pages = {263--278}, +series = {LNCS}, +volume = 4603, +publisher = {Springer}, +isbn = {978-3-540-73594-6}, +doi = {10.1007/978-3-540-73595-3_18}, +url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18}, +address = {Bremen, Germany}, +month = jul, +year = 2007, + +} + + + + + + + +@inproceedings{BCDG07, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {vesontio}, +classement = {ACTI}, +author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain}, +title = {Instantiation of Parameterized Data Structures for Model-Based Testing}, +booktitle = {B'2007, the 7th Int. B Conference}, +pages = {96--110}, +series = {LNCS}, +volume = 4355, +publisher = {Springer}, +doi = {10.1007/11955757_10}, +url = {http://dx.doi.org/10.1007/11955757_10}, +editor = {Julliand, Jacques and Kouchnarenko, Olga}, +address = {Besancon, France}, +month = jan, +year = 2007, + +} + + + +@article{byrd1995limited, + author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou}, + title = {A Limited Memory Algorithm for Bound Constrained Optimization}, + journal = {SIAM J. Sci. Comput.}, + issue_date = {Sept. 1995}, + volume = {16}, + number = {5}, + month = sep, + year = {1995}, + issn = {1064-8275}, + pages = {1190--1208}, + numpages = {19}, + url = {http://dx.doi.org/10.1137/0916069}, + doi = {10.1137/0916069}, + acmid = {210980}, + publisher = {Society for Industrial and Applied Mathematics}, + address = {Philadelphia, PA, USA}, + keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method}, +} + @article{ANU:1770520, author = {Powell,M. J. D.}, title = {Direct search algorithms for optimization calculations}, @@ -527,7 +863,1089 @@ doi = {10.1017/S0962492900002841}, URL = {http://journals.cambridge.org/article_S0962492900002841}, } +@article{Wang13, +year={2013}, +issn={0920-8542}, +journal={The Journal of Supercomputing}, +volume={64}, +number={3}, +doi={10.1007/s11227-010-0500-5}, +title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks}, +url={http://dx.doi.org/10.1007/s11227-010-0500-5}, +publisher={Springer US}, +keywords={Watermarking; Authentication; Wireless multimedia sensor network}, +author={Wang, Honggang}, +pages={883-897}, +language={English} +} + +@ARTICLE{HLG09, +author={Yifeng He and Lee, I. and Ling Guan}, +journal={Circuits and Systems for Video Technology, IEEE Transactions on}, +title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks}, +year={2009}, +volume={19}, +number={5}, +pages={704-718}, +keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, +doi={10.1109/TCSVT.2009.2017411}, +ISSN={1051-8215}} + +@ARTICLE{PM06, +author={Palomar, D.P. and Mung Chiang}, +journal={Selected Areas in Communications, IEEE Journal on}, +title={A tutorial on decomposition methods for network utility maximization}, +year={2006}, +volume={24}, +number={8}, +pages={1439-1451}, +keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, +doi={10.1109/JSAC.2006.879350}, +ISSN={0733-8716}} + +@article{HFD14, +year={2014}, +journal={EURASIP Journal on Information Security}, +eid={1}, +volume={2014}, +number={1}, +doi={10.1186/1687-417X-2014-1}, +title={Universal distortion function for steganography in an arbitrary domain}, +url={http://dx.doi.org/10.1186/1687-417X-2014-1}, +publisher={Springer International Publishing}, +author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, +language={English} +} + +@inproceedings{conf/wifs/HolubF12, + added-at = {2013-01-23T00:00:00.000+0100}, + author = {Holub, Vojtech and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, + booktitle = {WIFS}, + crossref = {conf/wifs/2012}, + ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, + interhash = {cbef658a6868216eef585dd759ae0668}, + intrahash = {a685b4b8b521ac99734fb52c064ca994}, + isbn = {978-1-4673-2285-0}, + keywords = {dblp}, + pages = {234-239}, + publisher = {IEEE}, + timestamp = {2013-01-23T00:00:00.000+0100}, + title = {Designing steganographic distortion using directional filters.}, + url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12}, + year = 2012 +} + + + + +@article{FillerJF11, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis + Codes}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {6}, + number = {3-2}, + year = {2011}, + pages = {920-935}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{DBLP:conf/ih/PereiraVMMP01, + editor = {Ira S. Moskowitz}, + author = {Shelby Pereira and + Sviatoslav Voloshynovskiy and + Maribel Madueno and + St{\'e}phane Marchand-Maillet and + Thierry Pun}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + title = {Second Generation Benchmarking and Application Oriented + Evaluation}, + year = {2001}, + pages = {340-353}, + series = lncs, + publisher = springer, + address = springer_loc, + month = apr, + volume = {2137}, +} + + +@inproceedings{DBLP:conf/ih/Westfeld01, + added-at = {2011-06-28T00:00:00.000+0200}, + author = {Westfeld, Andreas}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + editor = {Ira S. Moskowitz}, + pages = {289-302}, + publisher = springer, + address = springer_loc, + month=apr, + series = lncs, + title = {F5-A Steganographic Algorithm.}, + volume = 2137, + year = 2001 +} + +@article{Chang20101286, +title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", +journal = "Digital Signal Processing", +volume = "20", +number = "4", +pages = "1286 - 1307", +year = "2010", +note = "", +issn = "1051-2004", +doi = "10.1016/j.dsp.2009.11.005", +url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413", +author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le", +keywords = "Security", +keywords = "Wet paper coding", +keywords = "Steganography", +keywords = "Indicator", +keywords = "Fuzzy edge detector" +} + + + +@article{Hu:2007:HPE:1282866.1282944, + author = {Hu, Liming and Cheng, H. D. and Zhang, Ming}, + title = {A high performance edge detector based on fuzzy inference rules}, + journal = {Inf. Sci.}, + issue_date = {November, 2007}, + volume = {177}, + number = {21}, + month = nov, + year = {2007}, + issn = {0020-0255}, + pages = {4768--4784}, + numpages = {17}, + url = {http://dx.doi.org/10.1016/j.ins.2007.04.001}, + doi = {10.1016/j.ins.2007.04.001}, + acmid = {1282944}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, +} + + +@inproceedings{Dumitrescu:2005:LSB:1073170.1073176, + author = {Sorina Dumitrescu and + Xiaolin Wu}, + editor = {Ahmet M. Eskicioglu and + Jessica J. Fridrich and + Jana Dittmann}, + title = {LSB steganalysis based on high-order statistics}, + booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, + MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, + year = {2005}, + publisher = {ACM}, + address = {New York, NY, USA}, + month=aug, + pages = {25-32}, + ee = {http://doi.acm.org/10.1145/1073170.1073176}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{DBLP:conf/ih/Ker05, + author = {Andrew D. Ker}, + title = {A General Framework for Structural Steganalysis of LSB Replacement}, + editor = {Mauro Barni and + Jordi Herrera-Joancomart\'{\i} and + Stefan Katzenbeisser and + Fernando P{\'e}rez-Gonz{\'a}lez}, + booktitle = {Information Hiding, 7th International Workshop, IH 2005, + Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, + year = {2005}, + pages = {296-311}, + ee = {http://dx.doi.org/10.1007/11558859_22}, + publisher = springer, + address = springer_loc, + month= jun, + series = lncs, + volume = {3727}, +} + + +@inproceedings{FK12, + editor = {Matthias Kirchner and + Dipak Ghosal}, + booktitle = {Information Hiding - 14th International Conference, IH 2012, + Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, + author = {Jessica J. Fridrich and + Jan Kodovsk{\'y}}, + title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, + month=may, + year = {2012}, + pages = {31-45}, + ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, + volume = {7692}, + publisher = springer, + address = springer_loc, + series = lncs, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@article{DBLP:journals/tsp/DumitrescuWW03, + added-at = {2012-02-06T00:00:00.000+0100}, + author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe}, + biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp}, + ee = {http://dx.doi.org/10.1109/TSP.2003.812753}, + interhash = {f51bec0b4e4f8aba644eb0938018d2c6}, + intrahash = {556caad9b61980d3458885153a52321c}, + journal = {IEEE Transactions on Signal Processing}, + keywords = {dblp}, + number = 7, + pages = {1995-2007}, + timestamp = {2012-02-06T00:00:00.000+0100}, + title = {Detection of LSB steganography via sample pair analysis.}, + url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03}, + volume = 51, + year = 2003 +} + + + + +@inproceedings{DBLP:conf/mmsec/FridrichGD01, + editor = {Nicolas D. Georganas and + Radu Popescu-Zeletin}, + booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: + New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, + October 5, 2001}, + author = {Jessica J. Fridrich and + Miroslav Goljan and + Rui Du}, + title = {Reliable detection of LSB steganography in color and grayscale + images}, + year = {2001}, + pages = {27-30}, + ee = {http://doi.acm.org/10.1145/1232454.1232466}, + publisher = {ACM}, + address = {New York, NY, USA}, + month = oct, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + + +@inproceedings{DBLP:conf/ih/PevnyFB10, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Using High-Dimensional Image Models to Perform Highly Undetectable + Steganography}, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + booktitle = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + year = {2010}, + pages = {161-177}, + month=jun, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {6387}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + + +@Misc{Boss10, + OPTkey = {}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + + title = {Break Our Steganographic System}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2010}, + note = {Available at \url{http://www.agents.cz/boss/}}, + OPTannote = {} +} + +@proceedings{DBLP:conf/ih/2010, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + title = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + booktitle = {Information Hiding}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {6387}, + year = {2010}, + isbn = {978-3-642-16434-7}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@article{DBLP:journals/eswa/ChenCL10, + added-at = {2010-07-21T15:44:10.000+0200}, + author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan}, + biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp}, + date = {2010-05-03}, + ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050}, + interhash = {bc34a5f04661fee24ee62c39e76361be}, + intrahash = {28889a4ab329da28559f0910469f054b}, + journal = {Expert Systems with Applications}, + keywords = {dblp}, + number = 4, + pages = {3292-3301}, + timestamp = {2010-07-21T15:44:10.000+0200}, + title = {High payload steganography mechanism using hybrid edge detector.}, + url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10}, + volume = 37, + year = 2010 +} + +@article{DBLP:journals/tifs/FillerJF11, + added-at = {2011-09-29T00:00:00.000+0200}, + author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094}, + interhash = {b27d23ed0c9936d568e16c51378abccd}, + intrahash = {50e43c05a74eec17524b3df8db442da5}, + journal = {IEEE Transactions on Information Forensics and Security}, + keywords = {dblp}, + number = {3-2}, + pages = {920-935}, + timestamp = {2011-09-29T00:00:00.000+0200}, + title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.}, + url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11}, + volume = 6, + year = 2011 +} + + + + +@inproceedings{DBLP:conf/ih/KimDR06, + added-at = {2007-09-20T00:00:00.000+0200}, + author = {Kim, Younhee and Duric, Zoran and Richards, Dana}, + biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp}, + booktitle = {Information Hiding}, + crossref = {DBLP:conf/ih/2006}, + date = {2007-09-20}, + description = {dblp}, + editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil}, + ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21}, + interhash = {399aab122b39cfd6f6e951a1b276c786}, + intrahash = {f0324f70d62d9dfba568e393920aaa16}, + isbn = {978-3-540-74123-7}, + keywords = {dblp}, + pages = {314-327}, + month=jul, + publisher = springer, + address = springer_loc, + series = lncs, + timestamp = {2007-09-20T00:00:00.000+0200}, + title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, + url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, + volume = 4437, + year = 2006 +} + + +@proceedings{DBLP:conf/ih/2006, + editor = {Jan Camenisch and + Christian S. Collberg and + Neil F. Johnson and + Phil Sallee}, + title = {Information Hiding, 8th International Workshop, IH 2006, + Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, + booktitle = {Information Hiding}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {4437}, + year = {2007}, + isbn = {978-3-540-74123-7}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + +@inproceedings{DBLP:conf/mmsec/FridrichPK07, + author = {Jessica J. Fridrich and + Tom{\'a}s Pevn{\'y} and + Jan Kodovsk{\'y}}, + title = {Statistically undetectable jpeg steganography: dead ends + challenges, and opportunities}, + pages = {3-14}, + ee = {http://doi.acm.org/10.1145/1288869.1288872}, + editor = {Deepa Kundur and + Balakrishnan Prabhakaran and + Jana Dittmann and + Jessica J. Fridrich}, + booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, + MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, + publisher = {ACM}, + address = {New York, NY, USA}, + month=sep, + year = {2007}, + isbn = {978-1-59593-857-2}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + +@inproceedings{DBLP:conf/mediaforensics/FillerJF10, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing embedding impact in steganography using trellis-coded + quantization}, + year = {2010}, + pages = {754105}, + ee = {http://dx.doi.org/10.1117/12.838002}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + publisher = spie, + address = spie_loc, + month = jan, + series = {SPIE Proceedings}, + volume = {7541}, +} + + + + + + + + +@proceedings{DBLP:conf/mediaforensics/2010, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + title = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + booktitle = {Media Forensics and Security}, + publisher = spie, + address = spie_loc, + series = {SPIE Proceedings}, + volume = {7541}, + year = {2010}, + isbn = {978-0-8194-7934-1}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{DBLP:journals/corr/abs-1112-5239, + author = {Jacques M. Bahi and + Rapha{\"e}l Couturier and + Christophe Guyeux and + Pierre-Cyrille H{\'e}am}, + title = {Efficient and Cryptographically Secure Generation of Chaotic + Pseudorandom Numbers on GPU}, + journal = {CoRR}, + volume = {abs/1112.5239}, + year = {2011}, + ee = {http://arxiv.org/abs/1112.5239}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@Misc{psnrhvsm11, + author = {Ponomarenko, Nikolay}, + title = {PSNR-HVS-M page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}}, + OPTannote = {} +} + +@Misc{biqi11, + OPTkey = {}, + author = {Bovik, Alan C.}, + title = {BIQI page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}}, + OPTannote = {} +} + + +@InProceedings{PSECAL07, + author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir}, + title = {On between-coefficient contrast masking of DCT basis functions}, + booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA}, + OPTpages = {}, + year = {2007}, + editor = {Li,Baoxin}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + month = jan, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + + +@Article{MB10, + author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad}, + title = {A Two-Step Framework for Constructing Blind Image Quality Indices}, + journal = {IEEE Signal Processing Letters}, + year = {2010}, + volume = {17}, + number = {5}, + pages = {513--516}, + month = may, +} + + + + +@inproceedings{DBLP:conf/crypto/ShubBB82, + author = {Lenore Blum and + Manuel Blum and + Mike Shub}, + title = {Comparison of Two Pseudo-Random Number Generators}, + editor = {David Chaum and + Ronald L. Rivest and + Alan T. Sherman}, + booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa + Barbara, California, USA, August 23-25, 1982}, + pages = {61-78}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + publisher = {Plenum Press}, + address={New York, NY, USA}, + month=aug, + year = {1983}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@inproceedings{Blum:1985:EPP:19478.19501, + booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa + Barbara, California, USA, August 19-22, 1984, Proceedings}, + author = {Manuel Blum and + Shafi Goldwasser}, + title = {An Efficient Probabilistic Public-Key Encryption Scheme + Which Hides All Partial Information}, + month=aug, + year = {1985}, + pages = {289-302}, + editor = {G. R. Blakley and + David Chaum}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {196} +} + + + +@article{DBLP:journals/ejisec/FontaineG07, + author = {Caroline Fontaine and + Fabien Galand}, + title = {A Survey of Homomorphic Encryption for Nonspecialists}, + journal = {EURASIP Journal on Information Security}, + volume = {2007}, + year = {2007}, + NUMBER = {1}, + PAGES = {013801}, + ee = {http://dx.doi.org/10.1155/2007/13801}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@article{Luo:2010:EAI:1824719.1824720, + author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, + title = {Edge adaptive image steganography based on LSB matching revisited}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {5}, + number = {2}, + month = jun, + year = {2010}, + issn = {1556-6013}, + pages = {201--214}, + numpages = {14}, + url = {http://dx.doi.org/10.1109/TIFS.2010.2041812}, + doi = {10.1109/TIFS.2010.2041812}, + acmid = {1824720}, + publisher = {IEEE Press}, + address = {Piscataway, NJ, USA}, + keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis}, +} + +@article{Mielikainen06, + author = {Mielikainen, J.}, + title = {LSB Matching Revisited}, + journal = {IEEE Signal Processing Letters}, + year = {2006}, + OPTkey = {}, + volume = {13}, + number = {5}, + pages = {285--287}, + month = may, + OPTnote = {}, + OPTannote = {} +} + + + + + +@article{Liu:2008:FMP:1284917.1285196, + author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun}, + title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images}, + journal = {Pattern Recogn.}, + issue_date = {January, 2008}, + volume = {41}, + number = {1}, + month = jan, + year = {2008}, + issn = {0031-3203}, + pages = {56--66}, + numpages = {11}, + url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005}, + doi = {10.1016/j.patcog.2007.06.005}, + acmid = {1285196}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis}, +} + + + +@InProceedings{LHS08, + author = {Bin Li and Jiwu Huang and Yun Q. Shi}, + title = {Textural features based universal steganalysis}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {Proc. SPIE 6819}, + publisher = spie, + address = spie_loc, + pages = {12}, + year = {2008}, + OPTeditor = {}, + OPTvolume = {6819}, + + OPTseries = {}, + OPTaddress = {}, + month = feb, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + + +@InProceedings{KF11, + author = {Jan Kodovsk{\'y} and Jessica Fridrich}, + title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII}, + publisher = spie, + address = spie_loc, + month=feb, + pages = {78800L-78800L-13}, + OPTpages = {}, + year = {2011}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + OPTmonth = {}, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + +@article{DBLP:journals/tifs/KodovskyFH12, + author = {Jan Kodovsk{\'y} and + Jessica J. Fridrich and + Vojtech Holub}, + title = {Ensemble Classifiers for Steganalysis of Digital Media}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {7}, + number = {2}, + year = {2012}, + pages = {432-444}, + ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + +@article{Fillatre:2012:ASL:2333143.2333587, + author = {Fillatre, Lionel}, + title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images}, + journal = {IEEE Transactions on Signal Processing}, + year = {2012}, + volume = {60}, + number = {2}, + month = feb, + issn = {1053-587X}, + pages = {556--569}, + numpages = {14}, + url = {http://dx.doi.org/10.1109/TSP.2011.2174231}, + doi = {10.1109/TSP.2011.2174231}, + acmid = {2333587}, + publisher = {IEEE Press}, + address = {Piscataway, NJ, USA}, +} + + +@inproceedings{Tyan1993, + abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}}, + address = ieecs_loc, + publisher=ieecs, + author = {Tyan, C. Y. and Wang, P. P.}, + booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}}, + citeulike-article-id = {7936501}, + keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory}, + pages = {600--605}, + posted-at = {2010-10-01 17:27:48}, + priority = {0}, + month=apr, + title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}}, + volume = {1}, + year = {1993} +} + + +@article{Canny:1986:CAE:11274.11275, + author = {Canny, J}, + title = {A Computational Approach to Edge Detection}, + journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, + issue_date = {June 1986}, + volume = {PAMI-8}, + number = {6}, + month = jun, + year = {1986}, + issn = {0162-8828}, + pages = {679--698}, + numpages = {20}, + url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851}, + doi = {10.1109/TPAMI.1986.4767851}, + acmid = {11275}, + publisher = {IEEE Computer Society}, + address = {Washington, DC, USA}, + keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis}, +} + + +@inproceedings{DBLP:conf/ih/FridrichKHG11a, + author = {Jessica J. Fridrich and + Jan Kodovsk{\'y} and + Vojtech Holub and + Miroslav Goljan}, + title = {Steganalysis of Content-Adaptive Steganography in Spatial + Domain}, + booktitle = {Information Hiding}, + year = {2011}, + pages = {102-117}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8}, + crossref = {DBLP:conf/ih/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/ih/2011, + editor = {Tom{\'a}s Filler and + Tom{\'a}s Pevn{\'y} and + Scott Craver and + Andrew D. Ker}, + title = {Information Hiding - 13th International Conference, IH 2011, + Prague, Czech Republic, May 18-20, 2011, Revised Selected + Papers}, + booktitle = {Information Hiding}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {6958}, + year = {2011}, + isbn = {978-3-642-24177-2}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{DBLP:conf/iwdw/Fridrich11, + author = {Jessica J. Fridrich}, + title = {Modern Trends in Steganography and Steganalysis}, + booktitle = {IWDW}, + year = {2011}, + pages = {1}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1}, + crossref = {DBLP:conf/iwdw/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/iwdw/2011, + editor = {Yun-Qing Shi and + Hyoung-Joong Kim and + Fernando P{\'e}rez-Gonz{\'a}lez}, + title = {Digital Forensics and Watermarking - 10th International + Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, + 2011, Revised Selected Papers}, + booktitle = {IWDW}, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {7128}, + year = {2012}, + isbn = {978-3-642-32204-4}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + +@article{MCErlang07, + author = {Fredlund, Lars-\AAke and Svensson, Hans}, + title = {McErlang: a model checker for a distributed functional programming language}, + journal = {SIGPLAN Not.}, + volume = {42}, + issue = {9}, + year = {2007}, + issn = {0362-1340}, + pages = {125--136}, + numpages = {12}, + publisher = {ACM}, +} +@inproceedings{Bogor03, + author = {Robby and + Matthew B. Dwyer and + John Hatcliff}, + title = {Bogor: an extensible and highly-modular software model checking + framework}, + booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations + of Software Engineering 2003}, + publisher = {ACM}, + year = {2003}, + pages = {267-276}, +} + + +@ARTICLE{Banks92, + author = {Banks, John and J. Brooks and G. Cairns and P. Stacey}, + title = {On Devaney's Definition of Chaos}, + journal = {Amer. Math. Monthly}, + year = {1992}, + volume = {99}, + pages = {332--334}, + keywords = {(c+),}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@article{Crook2007267, +title = "Pattern recall in networks of chaotic neurons", +journal = "Biosystems", +volume = "87", +number = "2-3", +pages = "267 - 274", +year = "2007", +issn = "0303-2647", +doi = "DOI: 10.1016/j.biosystems.2006.09.022", +author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat", +keywords = "Chaos", +keywords = "Spiking neural network" +} + +@ARTICLE{Xiao10, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + year = {2010}, + pages = {1-9}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing + China}, + issn = {0941-0643}, + keyword = {Computer Science}, + publisher = {Springer London} +} + +@ARTICLE{1309431, +author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.}, +journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography}, +year={2004}, +month=may, +volume={50}, +number={2}, +pages={ 587 - 590}, +keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, +doi={10.1109/TCE.2004.1309431}, +} + +@article{Zhang2005759, +title = "An image encryption approach based on chaotic maps", +journal = "Chaos, Solitons \& Fractals", +volume = "24", +number = "3", +pages = "759 - 765", +year = "2005", +note = "", +issn = "0960-0779", +doi = "10.1016/j.chaos.2004.09.035", +author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang" +} + +@article{Lian20091296, +title = "A block cipher based on chaotic neural networks", +journal = "Neurocomputing", +volume = "72", +number = "4-6", +pages = "1296 - 1301", +year = "2009", +issn = "0925-2312", +author = "Shiguo Lian", +keywords = "Neural network", +keywords = "Chaos", +keywords = "Security", +keywords = "Block cipher", +keywords = "Image encryption" +} + +@article{Cybenko89, + author = {George Cybenko}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, + year = {1989}, + pages = {303-314} +} + + +@article{DBLP:journals/nn/HornikSW89, + author = {Kurt Hornik and + Maxwell B. Stinchcombe and + Halbert White}, + title = {Multilayer feedforward networks are universal approximators}, + journal = {Neural Networks}, + volume = {2}, + number = {5}, + year = {1989}, + pages = {359-366}, + ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{dalkiran10, + author = {Ilker Dalkiran and Kenan Danisman}, + affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey}, + title = {Artificial neural network based chaotic generator for cryptology}, + journal = TESC, + volume = {18}, + number = {2}, + pages = {225-240}, + year = {2010} +} + +@article{springerlink:10.1007/s00521-010-0432-2, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing China}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + publisher = {Springer}, + issn = {0941-0643}, + keyword = {Computer Science}, + pages = {1-9}, + year = {2010} +} + + +@article{Feder2009NTB, + author = {Feder, Tom\'{a}s and Subi, Carlos}, + title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations}, + journal = {Inf. Process. Lett.}, + issue_date = {February, 2009}, + volume = {109}, + number = {5}, + month = feb, + year = {2009}, + issn = {0020-0190}, + pages = {267--272}, + numpages = {6}, + url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015}, + doi = {10.1016/j.ipl.2008.10.015}, + acmid = {1496515}, + publisher = {Elsevier North-Holland, Inc.}, + address = {Amsterdam, The Netherlands, The Netherlands}, + keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings}, +} + + + +@Article{ZanSup04, + author={Zanten, A.~J.~van and Suparta, I.~N.}, + title={ Totally balanced and exponentially balanced Gray codes}, + journal={Discrete Analysis and Operational Research}, + series={Ser.~1}, + year={2004}, + volume={11}, + issue={4}, + pages={81--98} +} + +@book{LevinPeresWilmer2006, + added-at = {2010-01-19T17:51:27.000+0100}, + author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.}, + biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg}, + interhash = {61354795a6accb6407bfdbf04753a683}, + intrahash = {097dc4d1d0e412b2444f540b04110797}, + keywords = {markovchains probabilitytheory textbook}, + publisher = {American Mathematical Society}, + timestamp = {2010-01-19T17:51:27.000+0100}, + title = {{Markov chains and mixing times}}, + url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0}, + year = 2006 +} + + @Book{proba, + author = {M. Mitzenmacher and Eli Upfal}, + ALTeditor = {}, + title = {Probability and Computing}, + publisher = {Cambridge University Press}, + year = {2005}, +} + +@misc{Mons14, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers}, +howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France}, +day = 23, +month = sep, +year = 2014, + +}