From: couchot <jf.couchot@gmail.com>
Date: Mon, 21 Sep 2015 09:48:08 +0000 (+0200)
Subject: ajout des refs d'iihmsp13
X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/commitdiff_plain/8b404168f8d12dfcdfd506fac694406f6b8c45c6?ds=sidebyside;hp=9da96f9386f8fe53e0fb2a646cdee630f2609511

ajout des refs d'iihmsp13
---

diff --git a/bib/biblioand.bib b/bib/biblioand.bib
index 1bd9f55..018ed0d 100644
--- a/bib/biblioand.bib
+++ b/bib/biblioand.bib
@@ -1,6 +1,138 @@
 % This file was created with JabRef 2.3.1.
 % Encoding: ANSI_X3.4-1968
 
+@INPROCEEDINGS{rifq/others03,
+                    author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
+               x-lip6teams = {APA},
+                  x-lip6id = {4425},
+  x-international-audience = {yes},
+                     title = {{D}iscrimination power of measures of resemblance},
+                 booktitle = {{IFSA}'03},
+                      year = {2003},
+                  location = {Istanbul, Turkey}
+}
+
+
+@ARTICLE{Rifqi:2000:DPM:342947.342970,
+                    author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
+               x-lip6teams = {APA},
+                  x-lip6id = {4417},
+  x-international-audience = {yes},
+                     title = {{D}iscrimination power of measures of comparison},
+                   journal = {{F}uzzy {S}ets and {S}ystems},
+                    volume = {110},
+                      year = {2000},
+                     pages = {189-196}
+}
+
+
+
+@book{Anderberg-Cluster-1973,
+  added-at = {2008-10-29T00:31:48.000+0100},
+  author = {Anderberg, M. R.},
+  biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
+  interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
+  intrahash = {f586cc49441c591f06539d11d3e06006},
+  keywords = {cluster_analysis wismasys0809},
+  publisher = {Academic Press},
+  timestamp = {2008-10-29T00:31:48.000+0100},
+  title = {Cluster Analysis for Applications},
+  year = 1973
+}
+
+
+
+@article{yule1950introduction,
+	Author = {Yule, G.U. and Kendall, MG},
+	Date-Added = {2009-08-14 22:16:50 -0500},
+	Date-Modified = {2009-08-14 22:16:50 -0500},
+	Journal = {Statistics},
+	Title = {An Introduction to the Theory of},
+	Year = {1950}}
+
+
+@inproceedings{fgb11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
+title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
+booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
+pages = {218--227},
+address = {Sevilla, Spain},
+editor = {Javier Lopez and Pierangela Samarati},
+publisher = {SciTePress},
+month = jul,
+year = 2011,
+
+}
+
+
+@ARTICLE{Cayre2008,
+  author = {Cayre, F. and Bas, P.},
+  title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
+  journal = {IEEE Transactions on Information Forensics and Security},
+  year = {2008},
+  volume = {3},
+  pages = {1--15},
+  number = {1},
+  doi = {10.1109/TIFS.2007.916006},
+  issn = {1556-6013},
+  keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
+	security, watermarking, Kerckhoffs-based embedding security classes,
+	WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
+	steganography security, watermark-only-attack, watermarking, Security,
+	spread-spectrum (SS) watermarking},
+  owner = {guyeux},
+  timestamp = {2009.06.29}
+}
+@INPROCEEDINGS{Perez06,
+  author = {Perez-Freire, Luis  and Pérez-Gonzalez, F.  and Comesaña, Pedro },
+  title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
+	Approach},
+  booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
+  year = {2006},
+  volume =6072,
+  pages={1--12},
+  month = jan,
+  publisher = spie,
+  address = spie_loc
+}
+
+
+
+@ARTICLE{Cayre2005,
+  author = {Cayre, F. and Fontaine, C. and Furon, T.},
+  title = {Watermarking security: theory and practice},
+  journal = {IEEE Transactions on Signal Processing},
+  year = {2005},
+  volume = {53},
+  pages = {3976--3987},
+  number = {10},
+  keywords = {blind source separation, cryptography, watermarking, Fisher information
+	matrix, blind source separation, cryptanalysis, information theory,
+	spread spectrum techniques, substitutive scheme, watermarking security,
+	Blind source separation, Fisher information matrix, equivocation,
+	security, watermarking}
+}
+
+
+
+@inproceedings{Shujun1,
+  author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
+  title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
+	Their Roles in Cryptography and Pseudo-Random Coding},
+  booktitle = {Cryptography and Coding, 8th IMA International Conference,
+               Cirencester, UK},
+  month=dec,
+  year = 2001,
+  publisher = springer,
+  address = springer_loc,
+  series    = lncs,
+  volume    = {2260},
+   pages = {205--221}}
+
 
 @misc{cgh16:onp,
 inhal = {no},