1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @article{LiFengyongZhang14,
7 journal={annals of telecommunications - annales des t{\'e}l{\'e}communications},
10 doi={10.1007/s12243-013-0415-2},
11 title={Adaptive JPEG steganography with new distortion function},
12 url={http://dx.doi.org/10.1007/s12243-013-0415-2},
13 publisher={Springer Paris},
14 keywords={Steganography; Distortion function; Steganalysis},
15 author={Li, Fengyong and Zhang, Xinpeng and Yu, Jiang and Shen, Wenfeng},
21 @INPROCEEDINGS{nusmv02,
22 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
23 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
24 Sebastiani and Armando Tacchella},
25 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
29 crossref = {DBLP:conf/cav/2002}
33 author = {Nishanth Chandrasekaran},
34 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
39 Author = "Gastin, P. and Oddoux, D.",
40 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
41 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
42 Publisher = "Springer",
50 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
51 title = {A uniform deductive approach for parameterized protocol safety},
55 bibsource = {DBLP, http://dblp.uni-trier.de},
56 crossref = {DBLP:conf/kbse/2005},
57 ee = {http://doi.acm.org/10.1145/1101908.1101971}
60 @INPROCEEDINGS{abcvs05,
61 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
62 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
64 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
68 address = {Guelph, Canada},
70 note = {ISSN 1492-8760}
74 author = {Bahi, J. M.},
75 title = {Boolean totally asynchronous iterations},
83 author = {Bahi, J. M. and Contassot-Vivier, S.},
84 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
94 author = {Bahi, J. M. and Contassot-Vivier, S.},
95 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
100 pages = {1353--1363},
104 @techreport{BCVC10:ir,
105 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
106 title = {Convergence Results of Combining Synchronism and Asynchronism for
107 Discrete-State Discrete-Time Dynamic Network},
109 institution = {LIFC - Laboratoire d’{I}nformatique de
110 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
111 type = {Research Report},
112 number = {RR2010-02},
113 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
117 @techreport{Cou10:ir,
118 author = {Couchot, J.-F.},
119 title = {Formal {C}onvergence {P}roof for {D}iscrete
120 {D}ynamical {S}ystems},
122 institution = {LIFC - Laboratoire d’{I}nformatique de
123 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
124 type = {Research Report},
125 number = {RR2010-03},
126 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
134 author = {Bahi, J. M. and Michel, C.},
135 title = {Convergence of discrete asynchronous iterations},
136 journal = {International Journal Computer Mathematics},
143 author = {Bahi, J. M. and Michel, C.},
144 title = {Simulations of asynchronous evolution of discrete systems},
145 journal = {Simulation Practice and Theory},
153 author = {G\'{e}rard M. Baudet},
154 title = {Asynchronous Iterative Methods for Multiprocessors},
160 doi = {http://doi.acm.org/10.1145/322063.322067},
166 title = {Parallel and distributed computation: numerical methods},
167 publisher = prenticeHall,
169 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
170 isbn = {0-13-648700-9}
174 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
175 title = {The software model checker Blast},
183 @INPROCEEDINGS{LeCun85,
185 title = {A learning scheme for threshold networks},
186 booktitle = {Cognitiva'95},
189 address = {Paris, France}
193 author = {Jeffrey L. Elman},
194 title = {Finding Structure in Time},
195 journal = {Cognitive Science},
202 author = {Andreas Frommer and Daniel B. Szyld},
203 title = {On asynchronous iterations},
209 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
215 author = {Goles Ch., E. and Salinas,L.},
216 title = {Comparison between parallel and serial dynamics of Boolean networks},
225 title = {The SPIN Model Checker: Primer and Reference Manual},
226 publisher = {Addison-Wesley, Pearson Education},
228 author = {Gerard J. Holzmann}
232 author = {Shih M.-H. and Ho, J.-L.},
233 title = {Solution of the Boolean Markus-Yamabe Problem},
234 journal = advapplMath,
242 author = {Adrien Richard},
243 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
245 journal = advapplMath,
254 author = {Adrien Richard and Jean-Paul Comet},
255 title = {Necessary conditions for multistationarity in discrete dynamical
257 journal = discreteapplMath,
260 pages = {2403--2413},
267 title = {Les syst\`emes dynamiques discrets},
268 publisher = springer,
270 author = {F. Robert},
272 series = {Math\'ematiques et Applications}
276 author = {Shih, M.-H. and Dong J.-L.},
277 title = {A combinatorial analogue of the Jacobian problem in automata networks},
278 journal = advapplMath,
287 author = {Thomas, R.},
288 title = {Boolean Formalization of Genetic Control Circuits},
296 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
297 title = {Absence of Cycles in Symmetric Neural Networks},
303 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
306 @PROCEEDINGS{DBLP:conf/cav/2002,
307 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
308 Denmark, July 27-31, 2002, Proceedings},
310 editor = {Ed Brinksma and Kim Guldstrand Larsen},
313 publisher = springer,
317 @PROCEEDINGS{DBLP:conf/kbse/2005,
318 title = {20th IEEE/ACM International Conference on Automated Software Engineering
319 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
321 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
323 bibsource = {DBLP, http://dblp.uni-trier.de},
328 author = {Ben-Ari, Mordechai},
330 title = {Principles of the Spin Model Checker},
331 isbn = {1846287693, 9781846287695}},
332 publisher = springer,
336 @INPROCEEDINGS{Wei97,
337 author = {Weise,Carsten},
338 title = {An incremental formal semantics for {PROMELA}},
339 booktitle = {SPIN97, the Third SPIN Workshop},
344 @PHDTHESIS{Couchot-PhD06,
345 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
346 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
349 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
350 TYPE = {Th\`ese de {D}octorat},
355 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
356 Page, M. and Tewfik, S. and Geiselmann, J.},
357 title = {Qualitative simulation of genetic regulatory networks
358 using piecewise-linear models},
359 journal = {Bull. Math. Biol.},
371 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
372 title = {A Fruitful Application of Formal Methods to Biological
373 Regulatory Networks: Extending {T}homas' Asynchronous
374 Logical Approach with Temporal Logic},
375 journal = {J. Theor. Biol.},
385 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
386 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
387 journal = {Biosystems},
399 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
401 title = {Genetic Network Analyzer: qualitative simulation
402 of genetic regulatory networks.},
403 journal = {Bioinformatics},
411 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
412 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
413 journal = {Genes, Genomes and Genomics},
425 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
426 title = {Analysing formal models of genetic regulatory networks with delays},
427 journal = {Int. J. Bioinformatics Res. Appl.},
433 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
434 publisher = {Inderscience Publishers},
435 address = {Inderscience Publishers, Geneva, SWITZERLAND},
438 author = {Richard, A.},
439 title = {Local negative circuits and fixed points in Boolean networks},
440 institution = {preprint arXiv number 0910.0750},
453 author = {Remy, R. and Ruet, P. and Thieffry, D.},
454 title = {Graphic requirement for multistability and attractive cycles in a
455 Boolean dynamical framework},
456 journal = {Advances in Applied Mathematics},
462 timestamp = {2009.02.05}
465 @inproceedings{DBLP:conf/icann/BahiCMMS06,
466 author = {Jacques M. Bahi and
467 Sylvain Contassot-Vivier and
471 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
472 in Heterogeneous Environments},
473 booktitle = {ICANN (2)},
476 ee = {http://dx.doi.org/10.1007/11840930_81},
477 crossref = {DBLP:conf/icann/2006-2},
478 bibsource = {DBLP, http://dblp.uni-trier.de}
481 @proceedings{DBLP:conf/icann/2006-2,
482 editor = {Stefanos D. Kollias and
483 Andreas Stafylopatis and
486 title = {Artificial Neural Networks - ICANN 2006, 16th International
487 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
489 booktitle = {ICANN (2)},
490 publisher = {Springer},
491 series = {Lecture Notes in Computer Science},
494 isbn = {3-540-38871-0},
495 bibsource = {DBLP, http://dblp.uni-trier.de}
502 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
504 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
505 publisher = {Eyrolles},
523 title = {An Introduction to Chaotic Dynamical Systems},
524 publisher = {Redwood City: Addison-Wesley},
526 author = {R. L. Devaney},
529 timestamp = {27/01/2008}
534 @article{byrd1995limited,
535 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
536 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
537 journal = {SIAM J. Sci. Comput.},
538 issue_date = {Sept. 1995},
544 pages = {1190--1208},
546 url = {http://dx.doi.org/10.1137/0916069},
547 doi = {10.1137/0916069},
549 publisher = {Society for Industrial and Applied Mathematics},
550 address = {Philadelphia, PA, USA},
551 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
554 @article{ANU:1770520,
555 author = {Powell,M. J. D.},
556 title = {Direct search algorithms for optimization calculations},
557 journal = {Acta Numerica},
564 doi = {10.1017/S0962492900002841},
565 URL = {http://journals.cambridge.org/article_S0962492900002841},
571 author={Yifeng He and Lee, I. and Ling Guan},
572 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
573 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
578 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
579 doi={10.1109/TCSVT.2009.2017411},
583 author={Palomar, D.P. and Mung Chiang},
584 journal={Selected Areas in Communications, IEEE Journal on},
585 title={A tutorial on decomposition methods for network utility maximization},
590 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
591 doi={10.1109/JSAC.2006.879350},
596 journal={EURASIP Journal on Information Security},
600 doi={10.1186/1687-417X-2014-1},
601 title={Universal distortion function for steganography in an arbitrary domain},
602 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
603 publisher={Springer International Publishing},
604 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
608 @inproceedings{conf/wifs/HolubF12,
609 added-at = {2013-01-23T00:00:00.000+0100},
610 author = {Holub, Vojtech and Fridrich, Jessica J.},
611 booktitle = {2012 {IEEE} International Workshop on Information Forensics and Security, Tenerife, Spain},
613 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
614 interhash = {cbef658a6868216eef585dd759ae0668},
615 intrahash = {a685b4b8b521ac99734fb52c064ca994},
616 isbn = {978-1-4673-2285-0},
620 timestamp = {2013-01-23T00:00:00.000+0100},
621 title = {Designing steganographic distortion using directional filters.},
622 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
631 author = {Tom{\'a}s Filler and
633 Jessica J. Fridrich},
634 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
636 journal = {IEEE Transactions on Information Forensics and Security},
641 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
642 bibsource = {DBLP, http://dblp.uni-trier.de}
645 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
646 editor = {Ira S. Moskowitz},
647 author = {Shelby Pereira and
648 Sviatoslav Voloshynovskiy and
650 St{\'e}phane Marchand-Maillet and
652 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
653 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
654 title = {Second Generation Benchmarking and Application Oriented
659 publisher = springer,
660 address = springer_loc,
666 @inproceedings{DBLP:conf/ih/Westfeld01,
667 added-at = {2011-06-28T00:00:00.000+0200},
668 author = {Westfeld, Andreas},
669 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
670 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
671 editor = {Ira S. Moskowitz},
673 publisher = springer,
674 address = springer_loc,
677 title = {F5-A Steganographic Algorithm.},
686 @article{Chang20101286,
687 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
688 journal = "Digital Signal Processing",
691 pages = "1286 - 1307",
695 doi = "10.1016/j.dsp.2009.11.005",
696 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
697 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
698 keywords = "Security",
699 keywords = "Wet paper coding",
700 keywords = "Steganography",
701 keywords = "Indicator",
702 keywords = "Fuzzy edge detector"
707 @article{Hu:2007:HPE:1282866.1282944,
708 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
709 title = {A high performance edge detector based on fuzzy inference rules},
710 journal = {Inf. Sci.},
711 issue_date = {November, 2007},
717 pages = {4768--4784},
719 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
720 doi = {10.1016/j.ins.2007.04.001},
722 publisher = {Elsevier Science Inc.},
723 address = {New York, NY, USA},
724 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
728 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
729 author = {Sorina Dumitrescu and
731 editor = {Ahmet M. Eskicioglu and
732 Jessica J. Fridrich and
734 title = {LSB steganalysis based on high-order statistics},
735 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
736 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
739 address = {New York, NY, USA},
742 ee = {http://doi.acm.org/10.1145/1073170.1073176},
743 bibsource = {DBLP, http://dblp.uni-trier.de}
746 @inproceedings{DBLP:conf/ih/Ker05,
747 author = {Andrew D. Ker},
748 title = {A General Framework for Structural Steganalysis of LSB Replacement},
749 editor = {Mauro Barni and
750 Jordi Herrera-Joancomart\'{\i} and
751 Stefan Katzenbeisser and
752 Fernando P{\'e}rez-Gonz{\'a}lez},
753 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
754 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
757 ee = {http://dx.doi.org/10.1007/11558859_22},
758 publisher = springer,
759 address = springer_loc,
767 editor = {Matthias Kirchner and
769 booktitle = {Information Hiding - 14th International Conference, IH 2012,
770 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
771 author = {Jessica J. Fridrich and
773 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
777 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
779 publisher = springer,
780 address = springer_loc,
782 bibsource = {DBLP, http://dblp.uni-trier.de}
786 @article{DBLP:journals/tsp/DumitrescuWW03,
787 added-at = {2012-02-06T00:00:00.000+0100},
788 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
789 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
790 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
791 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
792 intrahash = {556caad9b61980d3458885153a52321c},
793 journal = {IEEE Transactions on Signal Processing},
797 timestamp = {2012-02-06T00:00:00.000+0100},
798 title = {Detection of LSB steganography via sample pair analysis.},
799 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
807 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
808 editor = {Nicolas D. Georganas and
809 Radu Popescu-Zeletin},
810 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
811 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
813 author = {Jessica J. Fridrich and
816 title = {Reliable detection of LSB steganography in color and grayscale
820 ee = {http://doi.acm.org/10.1145/1232454.1232466},
822 address = {New York, NY, USA},
824 bibsource = {DBLP, http://dblp.uni-trier.de}
831 @inproceedings{DBLP:conf/ih/PevnyFB10,
832 author = {Tom{\'a}s Pevn{\'y} and
835 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
837 editor = {Rainer B{\"o}hme and
838 Philip W. L. Fong and
839 Reihaneh Safavi-Naini},
840 booktitle = {Information Hiding - 12th International Conference, IH 2010,
841 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
846 publisher = springer,
847 address = springer_loc,
850 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
851 bibsource = {DBLP, http://dblp.uni-trier.de}
860 author = {Tom{\'a}s Pevn{\'y} and
864 title = {Break Our Steganographic System},
865 OPThowpublished = {},
868 note = {Available at \url{http://www.agents.cz/boss/}},
872 @proceedings{DBLP:conf/ih/2010,
873 editor = {Rainer B{\"o}hme and
874 Philip W. L. Fong and
875 Reihaneh Safavi-Naini},
876 title = {Information Hiding - 12th International Conference, IH 2010,
877 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
879 booktitle = {Information Hiding},
880 publisher = springer,
881 address = springer_loc,
885 isbn = {978-3-642-16434-7},
886 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
887 bibsource = {DBLP, http://dblp.uni-trier.de}
891 @article{DBLP:journals/eswa/ChenCL10,
892 added-at = {2010-07-21T15:44:10.000+0200},
893 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
894 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
896 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
897 interhash = {bc34a5f04661fee24ee62c39e76361be},
898 intrahash = {28889a4ab329da28559f0910469f054b},
899 journal = {Expert Systems with Applications},
903 timestamp = {2010-07-21T15:44:10.000+0200},
904 title = {High payload steganography mechanism using hybrid edge detector.},
905 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
910 @article{DBLP:journals/tifs/FillerJF11,
911 added-at = {2011-09-29T00:00:00.000+0200},
912 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
913 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
914 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
915 interhash = {b27d23ed0c9936d568e16c51378abccd},
916 intrahash = {50e43c05a74eec17524b3df8db442da5},
917 journal = {IEEE Transactions on Information Forensics and Security},
921 timestamp = {2011-09-29T00:00:00.000+0200},
922 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
923 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
931 @inproceedings{DBLP:conf/ih/KimDR06,
932 added-at = {2007-09-20T00:00:00.000+0200},
933 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
934 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
935 booktitle = {Information Hiding},
936 crossref = {DBLP:conf/ih/2006},
938 description = {dblp},
939 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
940 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
941 interhash = {399aab122b39cfd6f6e951a1b276c786},
942 intrahash = {f0324f70d62d9dfba568e393920aaa16},
943 isbn = {978-3-540-74123-7},
947 publisher = springer,
948 address = springer_loc,
950 timestamp = {2007-09-20T00:00:00.000+0200},
951 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
952 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
958 @proceedings{DBLP:conf/ih/2006,
959 editor = {Jan Camenisch and
960 Christian S. Collberg and
963 title = {Information Hiding, 8th International Workshop, IH 2006,
964 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
965 booktitle = {Information Hiding},
966 publisher = springer,
967 address = springer_loc,
971 isbn = {978-3-540-74123-7},
972 bibsource = {DBLP, http://dblp.uni-trier.de}
977 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
978 author = {Jessica J. Fridrich and
979 Tom{\'a}s Pevn{\'y} and
981 title = {Statistically undetectable jpeg steganography: dead ends
982 challenges, and opportunities},
984 ee = {http://doi.acm.org/10.1145/1288869.1288872},
985 editor = {Deepa Kundur and
986 Balakrishnan Prabhakaran and
988 Jessica J. Fridrich},
989 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
990 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
992 address = {New York, NY, USA},
995 isbn = {978-1-59593-857-2},
996 bibsource = {DBLP, http://dblp.uni-trier.de}
1002 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1003 editor = {Nasir D. Memon and
1005 Adnan M. Alattar and
1007 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1008 Electronic Imaging Symposium, San Jose, CA, USA, January
1009 18-20, 2010, Proceedings},
1010 author = {Tom{\'a}s Filler and
1012 Jessica J. Fridrich},
1013 title = {Minimizing embedding impact in steganography using trellis-coded
1017 ee = {http://dx.doi.org/10.1117/12.838002},
1018 bibsource = {DBLP, http://dblp.uni-trier.de},
1022 series = {SPIE Proceedings},
1033 @proceedings{DBLP:conf/mediaforensics/2010,
1034 editor = {Nasir D. Memon and
1036 Adnan M. Alattar and
1038 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1039 Electronic Imaging Symposium, San Jose, CA, USA, January
1040 18-20, 2010, Proceedings},
1041 booktitle = {Media Forensics and Security},
1044 series = {SPIE Proceedings},
1047 isbn = {978-0-8194-7934-1},
1048 bibsource = {DBLP, http://dblp.uni-trier.de}
1051 @article{DBLP:journals/corr/abs-1112-5239,
1052 author = {Jacques M. Bahi and
1053 Rapha{\"e}l Couturier and
1054 Christophe Guyeux and
1055 Pierre-Cyrille H{\'e}am},
1056 title = {Efficient and Cryptographically Secure Generation of Chaotic
1057 Pseudorandom Numbers on GPU},
1059 volume = {abs/1112.5239},
1061 ee = {http://arxiv.org/abs/1112.5239},
1062 bibsource = {DBLP, http://dblp.uni-trier.de}
1066 author = {Ponomarenko, Nikolay},
1067 title = {PSNR-HVS-M page},
1068 OPThowpublished = {},
1071 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1077 author = {Bovik, Alan C.},
1078 title = {BIQI page},
1079 OPThowpublished = {},
1082 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1087 @InProceedings{PSECAL07,
1088 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1089 title = {On between-coefficient contrast masking of DCT basis functions},
1090 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1093 editor = {Li,Baoxin},
1099 OPTorganization = {},
1107 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1108 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1109 journal = {IEEE Signal Processing Letters},
1120 @inproceedings{DBLP:conf/crypto/ShubBB82,
1121 author = {Lenore Blum and
1124 title = {Comparison of Two Pseudo-Random Number Generators},
1125 editor = {David Chaum and
1126 Ronald L. Rivest and
1128 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1129 Barbara, California, USA, August 23-25, 1982},
1131 bibsource = {DBLP, http://dblp.uni-trier.de},
1132 publisher = {Plenum Press},
1133 address={New York, NY, USA},
1136 bibsource = {DBLP, http://dblp.uni-trier.de}
1140 @inproceedings{Blum:1985:EPP:19478.19501,
1141 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1142 Barbara, California, USA, August 19-22, 1984, Proceedings},
1143 author = {Manuel Blum and
1145 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1146 Which Hides All Partial Information},
1150 editor = {G. R. Blakley and
1152 publisher = springer,
1153 address = springer_loc,
1160 @article{DBLP:journals/ejisec/FontaineG07,
1161 author = {Caroline Fontaine and
1163 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1164 journal = {EURASIP Journal on Information Security},
1169 ee = {http://dx.doi.org/10.1155/2007/13801},
1170 bibsource = {DBLP, http://dblp.uni-trier.de}
1174 @article{Luo:2010:EAI:1824719.1824720,
1175 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1176 title = {Edge adaptive image steganography based on LSB matching revisited},
1177 journal = {IEEE Transactions on Information Forensics and Security},
1185 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1186 doi = {10.1109/TIFS.2010.2041812},
1188 publisher = {IEEE Press},
1189 address = {Piscataway, NJ, USA},
1190 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1193 @article{Mielikainen06,
1194 author = {Mielikainen, J.},
1195 title = {LSB Matching Revisited},
1196 journal = {IEEE Signal Processing Letters},
1211 @article{Liu:2008:FMP:1284917.1285196,
1212 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1213 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1214 journal = {Pattern Recogn.},
1215 issue_date = {January, 2008},
1223 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1224 doi = {10.1016/j.patcog.2007.06.005},
1226 publisher = {Elsevier Science Inc.},
1227 address = {New York, NY, USA},
1228 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1233 @InProceedings{LHS08,
1234 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1235 title = {Textural features based universal steganalysis},
1238 booktitle = {Proc. SPIE 6819},
1249 OPTorganization = {},
1256 @InProceedings{KF11,
1257 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1258 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1261 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1265 pages = {78800L-78800L-13},
1274 OPTorganization = {},
1280 @article{DBLP:journals/tifs/KodovskyFH12,
1281 author = {Jan Kodovsk{\'y} and
1282 Jessica J. Fridrich and
1284 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1285 journal = {IEEE Transactions on Information Forensics and Security},
1290 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1291 bibsource = {DBLP, http://dblp.uni-trier.de}
1296 @article{Fillatre:2012:ASL:2333143.2333587,
1297 author = {Fillatre, Lionel},
1298 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1299 journal = {IEEE Transactions on Signal Processing},
1307 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1308 doi = {10.1109/TSP.2011.2174231},
1310 publisher = {IEEE Press},
1311 address = {Piscataway, NJ, USA},
1315 @inproceedings{Tyan1993,
1316 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1317 address = ieecs_loc,
1319 author = {Tyan, C. Y. and Wang, P. P.},
1320 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1321 citeulike-article-id = {7936501},
1322 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1324 posted-at = {2010-10-01 17:27:48},
1327 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1333 @article{Canny:1986:CAE:11274.11275,
1334 author = {Canny, J},
1335 title = {A Computational Approach to Edge Detection},
1336 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1337 issue_date = {June 1986},
1345 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1346 doi = {10.1109/TPAMI.1986.4767851},
1348 publisher = {IEEE Computer Society},
1349 address = {Washington, DC, USA},
1350 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1354 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1355 author = {Jessica J. Fridrich and
1356 Jan Kodovsk{\'y} and
1359 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1361 booktitle = {Information Hiding},
1364 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1365 crossref = {DBLP:conf/ih/2011},
1366 bibsource = {DBLP, http://dblp.uni-trier.de}
1368 @proceedings{DBLP:conf/ih/2011,
1369 editor = {Tom{\'a}s Filler and
1370 Tom{\'a}s Pevn{\'y} and
1373 title = {Information Hiding - 13th International Conference, IH 2011,
1374 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1376 booktitle = {Information Hiding},
1377 publisher = springer,
1378 address = springer_loc,
1382 isbn = {978-3-642-24177-2},
1383 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1384 bibsource = {DBLP, http://dblp.uni-trier.de}
1387 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1388 author = {Jessica J. Fridrich},
1389 title = {Modern Trends in Steganography and Steganalysis},
1393 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1394 crossref = {DBLP:conf/iwdw/2011},
1395 bibsource = {DBLP, http://dblp.uni-trier.de}
1397 @proceedings{DBLP:conf/iwdw/2011,
1398 editor = {Yun-Qing Shi and
1399 Hyoung-Joong Kim and
1400 Fernando P{\'e}rez-Gonz{\'a}lez},
1401 title = {Digital Forensics and Watermarking - 10th International
1402 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1403 2011, Revised Selected Papers},
1405 publisher = springer,
1406 address = springer_loc,
1410 isbn = {978-3-642-32204-4},
1411 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1412 bibsource = {DBLP, http://dblp.uni-trier.de}
1418 @inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10,
1419 author = {Jan Kodovský and
1421 Jessica J. Fridrich},
1422 title = {Modern steganalysis can detect YASS.},
1423 booktitle = {Media Forensics and Security},
1426 ee = {http://dx.doi.org/10.1117/12.838768}
1431 @article{liu2014syndrome,
1432 title={Syndrome trellis codes based on minimal span generator matrix},
1433 author={Liu, Weiwei and Liu, Guangjie and Dai, Yuewei},
1434 journal={annals of telecommunications-annales des t{\'e}l{\'e}communications},
1439 publisher={Springer}