X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/9da96f9386f8fe53e0fb2a646cdee630f2609511..8b404168f8d12dfcdfd506fac694406f6b8c45c6:/bib/biblioand.bib?ds=sidebyside diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 1bd9f55..018ed0d 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,138 @@ % This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 +@INPROCEEDINGS{rifq/others03, + author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4425}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of resemblance}, + booktitle = {{IFSA}'03}, + year = {2003}, + location = {Istanbul, Turkey} +} + + +@ARTICLE{Rifqi:2000:DPM:342947.342970, + author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette}, + x-lip6teams = {APA}, + x-lip6id = {4417}, + x-international-audience = {yes}, + title = {{D}iscrimination power of measures of comparison}, + journal = {{F}uzzy {S}ets and {S}ystems}, + volume = {110}, + year = {2000}, + pages = {189-196} +} + + + +@book{Anderberg-Cluster-1973, + added-at = {2008-10-29T00:31:48.000+0100}, + author = {Anderberg, M. R.}, + biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka}, + interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0}, + intrahash = {f586cc49441c591f06539d11d3e06006}, + keywords = {cluster_analysis wismasys0809}, + publisher = {Academic Press}, + timestamp = {2008-10-29T00:31:48.000+0100}, + title = {Cluster Analysis for Applications}, + year = 1973 +} + + + +@article{yule1950introduction, + Author = {Yule, G.U. and Kendall, MG}, + Date-Added = {2009-08-14 22:16:50 -0500}, + Date-Modified = {2009-08-14 22:16:50 -0500}, + Journal = {Statistics}, + Title = {An Introduction to the Theory of}, + Year = {1950}} + + +@inproceedings{fgb11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques}, +title = {Chaotic Iterations for Steganography - Stego-security and chaos-security}, +booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, +pages = {218--227}, +address = {Sevilla, Spain}, +editor = {Javier Lopez and Pierangela Samarati}, +publisher = {SciTePress}, +month = jul, +year = 2011, + +} + + +@ARTICLE{Cayre2008, + author = {Cayre, F. and Bas, P.}, + title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2008}, + volume = {3}, + pages = {1--15}, + number = {1}, + doi = {10.1109/TIFS.2007.916006}, + issn = {1556-6013}, + keywords = {cryptography, random sequences, spread spectrum communication, telecommunication + security, watermarking, Kerckhoffs-based embedding security classes, + WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques, + steganography security, watermark-only-attack, watermarking, Security, + spread-spectrum (SS) watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} +@INPROCEEDINGS{Perez06, + author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro }, + title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership + Approach}, + booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California}, + year = {2006}, + volume =6072, + pages={1--12}, + month = jan, + publisher = spie, + address = spie_loc +} + + + +@ARTICLE{Cayre2005, + author = {Cayre, F. and Fontaine, C. and Furon, T.}, + title = {Watermarking security: theory and practice}, + journal = {IEEE Transactions on Signal Processing}, + year = {2005}, + volume = {53}, + pages = {3976--3987}, + number = {10}, + keywords = {blind source separation, cryptography, watermarking, Fisher information + matrix, blind source separation, cryptanalysis, information theory, + spread spectrum techniques, substitutive scheme, watermarking security, + Blind source separation, Fisher information matrix, equivocation, + security, watermarking} +} + + + +@inproceedings{Shujun1, + author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong}, + title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and + Their Roles in Cryptography and Pseudo-Random Coding}, + booktitle = {Cryptography and Coding, 8th IMA International Conference, + Cirencester, UK}, + month=dec, + year = 2001, + publisher = springer, + address = springer_loc, + series = lncs, + volume = {2260}, + pages = {205--221}} + @misc{cgh16:onp, inhal = {no},