1 c% This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @INPROCEEDINGS{nusmv02,
5 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
6 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
7 Sebastiani and Armando Tacchella},
8 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
12 crossref = {DBLP:conf/cav/2002}
16 author = {Nishanth Chandrasekaran},
17 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
22 Author = "Gastin, P. and Oddoux, D.",
23 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
24 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
25 Publisher = "Springer",
33 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
34 title = {A uniform deductive approach for parameterized protocol safety},
38 bibsource = {DBLP, http://dblp.uni-trier.de},
39 crossref = {DBLP:conf/kbse/2005},
40 ee = {http://doi.acm.org/10.1145/1101908.1101971}
43 @INPROCEEDINGS{abcvs05,
44 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
45 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
47 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
51 address = {Guelph, Canada},
53 note = {ISSN 1492-8760}
57 author = {Bahi, J. M.},
58 title = {Boolean totally asynchronous iterations},
66 author = {Bahi, J. M. and Contassot-Vivier, S.},
67 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
77 author = {Bahi, J. M. and Contassot-Vivier, S.},
78 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
87 @techreport{BCVC10:ir,
88 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
89 title = {Convergence Results of Combining Synchronism and Asynchronism for
90 Discrete-State Discrete-Time Dynamic Network},
92 institution = {LIFC - Laboratoire d’{I}nformatique de
93 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
94 type = {Research Report},
96 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
100 @techreport{Cou10:ir,
101 author = {Couchot, J.-F.},
102 title = {Formal {C}onvergence {P}roof for {D}iscrete
103 {D}ynamical {S}ystems},
105 institution = {LIFC - Laboratoire d’{I}nformatique de
106 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
107 type = {Research Report},
108 number = {RR2010-03},
109 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
117 author = {Bahi, J. M. and Michel, C.},
118 title = {Convergence of discrete asynchronous iterations},
119 journal = {International Journal Computer Mathematics},
126 author = {Bahi, J. M. and Michel, C.},
127 title = {Simulations of asynchronous evolution of discrete systems},
128 journal = {Simulation Practice and Theory},
136 author = {G\'{e}rard M. Baudet},
137 title = {Asynchronous Iterative Methods for Multiprocessors},
143 doi = {http://doi.acm.org/10.1145/322063.322067},
149 title = {Parallel and distributed computation: numerical methods},
150 publisher = prenticeHall,
152 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
153 isbn = {0-13-648700-9}
157 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
158 title = {The software model checker Blast},
166 @INPROCEEDINGS{LeCun85,
168 title = {A learning scheme for threshold networks},
169 booktitle = {Cognitiva'95},
172 address = {Paris, France}
176 author = {Jeffrey L. Elman},
177 title = {Finding Structure in Time},
178 journal = {Cognitive Science},
185 author = {Andreas Frommer and Daniel B. Szyld},
186 title = {On asynchronous iterations},
192 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
198 author = {Goles Ch., E. and Salinas,L.},
199 title = {Comparison between parallel and serial dynamics of Boolean networks},
208 title = {The SPIN Model Checker: Primer and Reference Manual},
209 publisher = {Addison-Wesley, Pearson Education},
211 author = {Gerard J. Holzmann}
215 author = {Shih M.-H. and Ho, J.-L.},
216 title = {Solution of the Boolean Markus-Yamabe Problem},
217 journal = advapplMath,
225 author = {Adrien Richard},
226 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
228 journal = advapplMath,
237 author = {Adrien Richard and Jean-Paul Comet},
238 title = {Necessary conditions for multistationarity in discrete dynamical
240 journal = discreteapplMath,
243 pages = {2403--2413},
250 title = {Les syst\`emes dynamiques discrets},
251 publisher = springer,
253 author = {F. Robert},
255 series = {Math\'ematiques et Applications}
259 author = {Shih, M.-H. and Dong J.-L.},
260 title = {A combinatorial analogue of the Jacobian problem in automata networks},
261 journal = advapplMath,
270 author = {Thomas, R.},
271 title = {Boolean Formalization of Genetic Control Circuits},
279 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
280 title = {Absence of Cycles in Symmetric Neural Networks},
286 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
289 @PROCEEDINGS{DBLP:conf/cav/2002,
290 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
291 Denmark, July 27-31, 2002, Proceedings},
293 editor = {Ed Brinksma and Kim Guldstrand Larsen},
296 publisher = springer,
300 @PROCEEDINGS{DBLP:conf/kbse/2005,
301 title = {20th IEEE/ACM International Conference on Automated Software Engineering
302 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
304 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
306 bibsource = {DBLP, http://dblp.uni-trier.de},
311 author = {Ben-Ari, Mordechai},
313 title = {Principles of the Spin Model Checker},
314 isbn = {1846287693, 9781846287695}},
315 publisher = springer,
319 @INPROCEEDINGS{Wei97,
320 author = {Weise,Carsten},
321 title = {An incremental formal semantics for {PROMELA}},
322 booktitle = {SPIN97, the Third SPIN Workshop},
327 @PHDTHESIS{Couchot-PhD06,
328 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
329 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
332 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
333 TYPE = {Th\`ese de {D}octorat},
338 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
339 Page, M. and Tewfik, S. and Geiselmann, J.},
340 title = {Qualitative simulation of genetic regulatory networks
341 using piecewise-linear models},
342 journal = {Bull. Math. Biol.},
354 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
355 title = {A Fruitful Application of Formal Methods to Biological
356 Regulatory Networks: Extending {T}homas' Asynchronous
357 Logical Approach with Temporal Logic},
358 journal = {J. Theor. Biol.},
368 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
369 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
370 journal = {Biosystems},
382 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
384 title = {Genetic Network Analyzer: qualitative simulation
385 of genetic regulatory networks.},
386 journal = {Bioinformatics},
394 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
395 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
396 journal = {Genes, Genomes and Genomics},
408 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
409 title = {Analysing formal models of genetic regulatory networks with delays},
410 journal = {Int. J. Bioinformatics Res. Appl.},
416 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
417 publisher = {Inderscience Publishers},
418 address = {Inderscience Publishers, Geneva, SWITZERLAND},
421 author = {Richard, A.},
422 title = {Local negative circuits and fixed points in Boolean networks},
423 institution = {preprint arXiv number 0910.0750},
436 author = {Remy, R. and Ruet, P. and Thieffry, D.},
437 title = {Graphic requirement for multistability and attractive cycles in a
438 Boolean dynamical framework},
439 journal = {Advances in Applied Mathematics},
445 timestamp = {2009.02.05}
448 @inproceedings{DBLP:conf/icann/BahiCMMS06,
449 author = {Jacques M. Bahi and
450 Sylvain Contassot-Vivier and
454 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
455 in Heterogeneous Environments},
456 booktitle = {ICANN (2)},
459 ee = {http://dx.doi.org/10.1007/11840930_81},
460 crossref = {DBLP:conf/icann/2006-2},
461 bibsource = {DBLP, http://dblp.uni-trier.de}
464 @proceedings{DBLP:conf/icann/2006-2,
465 editor = {Stefanos D. Kollias and
466 Andreas Stafylopatis and
469 title = {Artificial Neural Networks - ICANN 2006, 16th International
470 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
472 booktitle = {ICANN (2)},
473 publisher = {Springer},
474 series = {Lecture Notes in Computer Science},
477 isbn = {3-540-38871-0},
478 bibsource = {DBLP, http://dblp.uni-trier.de}
485 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
487 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
488 publisher = {Eyrolles},
506 title = {An Introduction to Chaotic Dynamical Systems},
507 publisher = {Redwood City: Addison-Wesley},
509 author = {R. L. Devaney},
512 timestamp = {27/01/2008}
517 @article{byrd1995limited,
518 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
519 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
520 journal = {SIAM J. Sci. Comput.},
521 issue_date = {Sept. 1995},
527 pages = {1190--1208},
529 url = {http://dx.doi.org/10.1137/0916069},
530 doi = {10.1137/0916069},
532 publisher = {Society for Industrial and Applied Mathematics},
533 address = {Philadelphia, PA, USA},
534 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
537 @article{ANU:1770520,
538 author = {Powell,M. J. D.},
539 title = {Direct search algorithms for optimization calculations},
540 journal = {Acta Numerica},
547 doi = {10.1017/S0962492900002841},
548 URL = {http://journals.cambridge.org/article_S0962492900002841},
554 author={Yifeng He and Lee, I. and Ling Guan},
555 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
556 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
561 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
562 doi={10.1109/TCSVT.2009.2017411},
566 author={Palomar, D.P. and Mung Chiang},
567 journal={Selected Areas in Communications, IEEE Journal on},
568 title={A tutorial on decomposition methods for network utility maximization},
573 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
574 doi={10.1109/JSAC.2006.879350},
579 journal={EURASIP Journal on Information Security},
583 doi={10.1186/1687-417X-2014-1},
584 title={Universal distortion function for steganography in an arbitrary domain},
585 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
586 publisher={Springer International Publishing},
587 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
591 @inproceedings{conf/wifs/HolubF12,
592 added-at = {2013-01-23T00:00:00.000+0100},
593 author = {Holub, Vojtech and Fridrich, Jessica J.},
594 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
596 crossref = {conf/wifs/2012},
597 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
598 interhash = {cbef658a6868216eef585dd759ae0668},
599 intrahash = {a685b4b8b521ac99734fb52c064ca994},
600 isbn = {978-1-4673-2285-0},
604 timestamp = {2013-01-23T00:00:00.000+0100},
605 title = {Designing steganographic distortion using directional filters.},
606 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
614 author = {Tom{\'a}s Filler and
616 Jessica J. Fridrich},
617 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
619 journal = {IEEE Transactions on Information Forensics and Security},
624 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
625 bibsource = {DBLP, http://dblp.uni-trier.de}
628 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
629 editor = {Ira S. Moskowitz},
630 author = {Shelby Pereira and
631 Sviatoslav Voloshynovskiy and
633 St{\'e}phane Marchand-Maillet and
635 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
636 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
637 title = {Second Generation Benchmarking and Application Oriented
642 publisher = springer,
643 address = springer_loc,
649 @inproceedings{DBLP:conf/ih/Westfeld01,
650 added-at = {2011-06-28T00:00:00.000+0200},
651 author = {Westfeld, Andreas},
652 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
653 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
654 editor = {Ira S. Moskowitz},
656 publisher = springer,
657 address = springer_loc,
660 title = {F5-A Steganographic Algorithm.},
669 @article{Chang20101286,
670 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
671 journal = "Digital Signal Processing",
674 pages = "1286 - 1307",
678 doi = "10.1016/j.dsp.2009.11.005",
679 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
680 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
681 keywords = "Security",
682 keywords = "Wet paper coding",
683 keywords = "Steganography",
684 keywords = "Indicator",
685 keywords = "Fuzzy edge detector"
690 @article{Hu:2007:HPE:1282866.1282944,
691 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
692 title = {A high performance edge detector based on fuzzy inference rules},
693 journal = {Inf. Sci.},
694 issue_date = {November, 2007},
700 pages = {4768--4784},
702 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
703 doi = {10.1016/j.ins.2007.04.001},
705 publisher = {Elsevier Science Inc.},
706 address = {New York, NY, USA},
707 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
711 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
712 author = {Sorina Dumitrescu and
714 editor = {Ahmet M. Eskicioglu and
715 Jessica J. Fridrich and
717 title = {LSB steganalysis based on high-order statistics},
718 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
719 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
722 address = {New York, NY, USA},
725 ee = {http://doi.acm.org/10.1145/1073170.1073176},
726 bibsource = {DBLP, http://dblp.uni-trier.de}
729 @inproceedings{DBLP:conf/ih/Ker05,
730 author = {Andrew D. Ker},
731 title = {A General Framework for Structural Steganalysis of LSB Replacement},
732 editor = {Mauro Barni and
733 Jordi Herrera-Joancomart\'{\i} and
734 Stefan Katzenbeisser and
735 Fernando P{\'e}rez-Gonz{\'a}lez},
736 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
737 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
740 ee = {http://dx.doi.org/10.1007/11558859_22},
741 publisher = springer,
742 address = springer_loc,
750 editor = {Matthias Kirchner and
752 booktitle = {Information Hiding - 14th International Conference, IH 2012,
753 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
754 author = {Jessica J. Fridrich and
756 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
760 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
762 publisher = springer,
763 address = springer_loc,
765 bibsource = {DBLP, http://dblp.uni-trier.de}
769 @article{DBLP:journals/tsp/DumitrescuWW03,
770 added-at = {2012-02-06T00:00:00.000+0100},
771 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
772 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
773 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
774 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
775 intrahash = {556caad9b61980d3458885153a52321c},
776 journal = {IEEE Transactions on Signal Processing},
780 timestamp = {2012-02-06T00:00:00.000+0100},
781 title = {Detection of LSB steganography via sample pair analysis.},
782 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
790 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
791 editor = {Nicolas D. Georganas and
792 Radu Popescu-Zeletin},
793 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
794 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
796 author = {Jessica J. Fridrich and
799 title = {Reliable detection of LSB steganography in color and grayscale
803 ee = {http://doi.acm.org/10.1145/1232454.1232466},
805 address = {New York, NY, USA},
807 bibsource = {DBLP, http://dblp.uni-trier.de}
814 @inproceedings{DBLP:conf/ih/PevnyFB10,
815 author = {Tom{\'a}s Pevn{\'y} and
818 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
820 editor = {Rainer B{\"o}hme and
821 Philip W. L. Fong and
822 Reihaneh Safavi-Naini},
823 booktitle = {Information Hiding - 12th International Conference, IH 2010,
824 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
829 publisher = springer,
830 address = springer_loc,
833 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
834 bibsource = {DBLP, http://dblp.uni-trier.de}
843 author = {Tom{\'a}s Pevn{\'y} and
847 title = {Break Our Steganographic System},
848 OPThowpublished = {},
851 note = {Available at \url{http://www.agents.cz/boss/}},
855 @proceedings{DBLP:conf/ih/2010,
856 editor = {Rainer B{\"o}hme and
857 Philip W. L. Fong and
858 Reihaneh Safavi-Naini},
859 title = {Information Hiding - 12th International Conference, IH 2010,
860 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
862 booktitle = {Information Hiding},
863 publisher = springer,
864 address = springer_loc,
868 isbn = {978-3-642-16434-7},
869 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
870 bibsource = {DBLP, http://dblp.uni-trier.de}
874 @article{DBLP:journals/eswa/ChenCL10,
875 added-at = {2010-07-21T15:44:10.000+0200},
876 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
877 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
879 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
880 interhash = {bc34a5f04661fee24ee62c39e76361be},
881 intrahash = {28889a4ab329da28559f0910469f054b},
882 journal = {Expert Systems with Applications},
886 timestamp = {2010-07-21T15:44:10.000+0200},
887 title = {High payload steganography mechanism using hybrid edge detector.},
888 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
893 @article{DBLP:journals/tifs/FillerJF11,
894 added-at = {2011-09-29T00:00:00.000+0200},
895 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
896 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
897 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
898 interhash = {b27d23ed0c9936d568e16c51378abccd},
899 intrahash = {50e43c05a74eec17524b3df8db442da5},
900 journal = {IEEE Transactions on Information Forensics and Security},
904 timestamp = {2011-09-29T00:00:00.000+0200},
905 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
906 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
914 @inproceedings{DBLP:conf/ih/KimDR06,
915 added-at = {2007-09-20T00:00:00.000+0200},
916 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
917 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
918 booktitle = {Information Hiding},
919 crossref = {DBLP:conf/ih/2006},
921 description = {dblp},
922 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
923 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
924 interhash = {399aab122b39cfd6f6e951a1b276c786},
925 intrahash = {f0324f70d62d9dfba568e393920aaa16},
926 isbn = {978-3-540-74123-7},
930 publisher = springer,
931 address = springer_loc,
933 timestamp = {2007-09-20T00:00:00.000+0200},
934 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
935 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
941 @proceedings{DBLP:conf/ih/2006,
942 editor = {Jan Camenisch and
943 Christian S. Collberg and
946 title = {Information Hiding, 8th International Workshop, IH 2006,
947 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
948 booktitle = {Information Hiding},
949 publisher = springer,
950 address = springer_loc,
954 isbn = {978-3-540-74123-7},
955 bibsource = {DBLP, http://dblp.uni-trier.de}
960 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
961 author = {Jessica J. Fridrich and
962 Tom{\'a}s Pevn{\'y} and
964 title = {Statistically undetectable jpeg steganography: dead ends
965 challenges, and opportunities},
967 ee = {http://doi.acm.org/10.1145/1288869.1288872},
968 editor = {Deepa Kundur and
969 Balakrishnan Prabhakaran and
971 Jessica J. Fridrich},
972 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
973 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
975 address = {New York, NY, USA},
978 isbn = {978-1-59593-857-2},
979 bibsource = {DBLP, http://dblp.uni-trier.de}
985 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
986 editor = {Nasir D. Memon and
990 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
991 Electronic Imaging Symposium, San Jose, CA, USA, January
992 18-20, 2010, Proceedings},
993 author = {Tom{\'a}s Filler and
995 Jessica J. Fridrich},
996 title = {Minimizing embedding impact in steganography using trellis-coded
1000 ee = {http://dx.doi.org/10.1117/12.838002},
1001 bibsource = {DBLP, http://dblp.uni-trier.de},
1005 series = {SPIE Proceedings},
1016 @proceedings{DBLP:conf/mediaforensics/2010,
1017 editor = {Nasir D. Memon and
1019 Adnan M. Alattar and
1021 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1022 Electronic Imaging Symposium, San Jose, CA, USA, January
1023 18-20, 2010, Proceedings},
1024 booktitle = {Media Forensics and Security},
1027 series = {SPIE Proceedings},
1030 isbn = {978-0-8194-7934-1},
1031 bibsource = {DBLP, http://dblp.uni-trier.de}
1034 @article{DBLP:journals/corr/abs-1112-5239,
1035 author = {Jacques M. Bahi and
1036 Rapha{\"e}l Couturier and
1037 Christophe Guyeux and
1038 Pierre-Cyrille H{\'e}am},
1039 title = {Efficient and Cryptographically Secure Generation of Chaotic
1040 Pseudorandom Numbers on GPU},
1042 volume = {abs/1112.5239},
1044 ee = {http://arxiv.org/abs/1112.5239},
1045 bibsource = {DBLP, http://dblp.uni-trier.de}
1049 author = {Ponomarenko, Nikolay},
1050 title = {PSNR-HVS-M page},
1051 OPThowpublished = {},
1054 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1060 author = {Bovik, Alan C.},
1061 title = {BIQI page},
1062 OPThowpublished = {},
1065 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1070 @InProceedings{PSECAL07,
1071 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1072 title = {On between-coefficient contrast masking of DCT basis functions},
1073 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1076 editor = {Li,Baoxin},
1082 OPTorganization = {},
1090 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1091 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1092 journal = {IEEE Signal Processing Letters},
1103 @inproceedings{DBLP:conf/crypto/ShubBB82,
1104 author = {Lenore Blum and
1107 title = {Comparison of Two Pseudo-Random Number Generators},
1108 editor = {David Chaum and
1109 Ronald L. Rivest and
1111 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1112 Barbara, California, USA, August 23-25, 1982},
1114 bibsource = {DBLP, http://dblp.uni-trier.de},
1115 publisher = {Plenum Press},
1116 address={New York, NY, USA},
1119 bibsource = {DBLP, http://dblp.uni-trier.de}
1123 @inproceedings{Blum:1985:EPP:19478.19501,
1124 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1125 Barbara, California, USA, August 19-22, 1984, Proceedings},
1126 author = {Manuel Blum and
1128 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1129 Which Hides All Partial Information},
1133 editor = {G. R. Blakley and
1135 publisher = springer,
1136 address = springer_loc,
1143 @article{DBLP:journals/ejisec/FontaineG07,
1144 author = {Caroline Fontaine and
1146 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1147 journal = {EURASIP Journal on Information Security},
1152 ee = {http://dx.doi.org/10.1155/2007/13801},
1153 bibsource = {DBLP, http://dblp.uni-trier.de}
1157 @article{Luo:2010:EAI:1824719.1824720,
1158 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1159 title = {Edge adaptive image steganography based on LSB matching revisited},
1160 journal = {IEEE Transactions on Information Forensics and Security},
1168 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1169 doi = {10.1109/TIFS.2010.2041812},
1171 publisher = {IEEE Press},
1172 address = {Piscataway, NJ, USA},
1173 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1176 @article{Mielikainen06,
1177 author = {Mielikainen, J.},
1178 title = {LSB Matching Revisited},
1179 journal = {IEEE Signal Processing Letters},
1194 @article{Liu:2008:FMP:1284917.1285196,
1195 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1196 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1197 journal = {Pattern Recogn.},
1198 issue_date = {January, 2008},
1206 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1207 doi = {10.1016/j.patcog.2007.06.005},
1209 publisher = {Elsevier Science Inc.},
1210 address = {New York, NY, USA},
1211 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1216 @InProceedings{LHS08,
1217 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1218 title = {Textural features based universal steganalysis},
1221 booktitle = {Proc. SPIE 6819},
1232 OPTorganization = {},
1239 @InProceedings{KF11,
1240 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1241 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1244 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1248 pages = {78800L-78800L-13},
1257 OPTorganization = {},
1263 @article{DBLP:journals/tifs/KodovskyFH12,
1264 author = {Jan Kodovsk{\'y} and
1265 Jessica J. Fridrich and
1267 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1268 journal = {IEEE Transactions on Information Forensics and Security},
1273 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1274 bibsource = {DBLP, http://dblp.uni-trier.de}
1279 @article{Fillatre:2012:ASL:2333143.2333587,
1280 author = {Fillatre, Lionel},
1281 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1282 journal = {IEEE Transactions on Signal Processing},
1290 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1291 doi = {10.1109/TSP.2011.2174231},
1293 publisher = {IEEE Press},
1294 address = {Piscataway, NJ, USA},
1298 @inproceedings{Tyan1993,
1299 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1300 address = ieecs_loc,
1302 author = {Tyan, C. Y. and Wang, P. P.},
1303 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1304 citeulike-article-id = {7936501},
1305 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1307 posted-at = {2010-10-01 17:27:48},
1310 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1316 @article{Canny:1986:CAE:11274.11275,
1317 author = {Canny, J},
1318 title = {A Computational Approach to Edge Detection},
1319 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1320 issue_date = {June 1986},
1328 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1329 doi = {10.1109/TPAMI.1986.4767851},
1331 publisher = {IEEE Computer Society},
1332 address = {Washington, DC, USA},
1333 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1337 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1338 author = {Jessica J. Fridrich and
1339 Jan Kodovsk{\'y} and
1342 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1344 booktitle = {Information Hiding},
1347 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1348 crossref = {DBLP:conf/ih/2011},
1349 bibsource = {DBLP, http://dblp.uni-trier.de}
1351 @proceedings{DBLP:conf/ih/2011,
1352 editor = {Tom{\'a}s Filler and
1353 Tom{\'a}s Pevn{\'y} and
1356 title = {Information Hiding - 13th International Conference, IH 2011,
1357 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1359 booktitle = {Information Hiding},
1360 publisher = springer,
1361 address = springer_loc,
1365 isbn = {978-3-642-24177-2},
1366 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1367 bibsource = {DBLP, http://dblp.uni-trier.de}
1370 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1371 author = {Jessica J. Fridrich},
1372 title = {Modern Trends in Steganography and Steganalysis},
1376 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1377 crossref = {DBLP:conf/iwdw/2011},
1378 bibsource = {DBLP, http://dblp.uni-trier.de}
1380 @proceedings{DBLP:conf/iwdw/2011,
1381 editor = {Yun-Qing Shi and
1382 Hyoung-Joong Kim and
1383 Fernando P{\'e}rez-Gonz{\'a}lez},
1384 title = {Digital Forensics and Watermarking - 10th International
1385 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1386 2011, Revised Selected Papers},
1388 publisher = springer,
1389 address = springer_loc,
1393 isbn = {978-3-642-32204-4},
1394 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1395 bibsource = {DBLP, http://dblp.uni-trier.de}