1 @article{Hu:2007:HPE:1282866.1282944,
2 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
3 title = {A high performance edge detector based on fuzzy inference rules},
5 issue_date = {November, 2007},
13 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
14 doi = {10.1016/j.ins.2007.04.001},
16 publisher = {Elsevier Science Inc.},
17 address = {New York, NY, USA},
18 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
20 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
21 author = {Dumitrescu, Sorina and Wu, Xiaolin},
22 title = {LSB steganalysis based on high-order statistics},
23 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
26 isbn = {1-59593-032-9},
27 location = {New York, NY, USA},
30 url = {http://doi.acm.org/10.1145/1073170.1073176},
31 doi = {10.1145/1073170.1073176},
34 address = {New York, NY, USA},
35 keywords = {LSB steganography, digital media, steganalysis},
38 @inproceedings{DBLP:conf/ih/Ker05,
39 author = {Andrew D. Ker},
40 title = {A General Framework for Structural Steganalysis of LSB Replacement},
41 booktitle = {Information Hiding},
44 ee = {http://dx.doi.org/10.1007/11558859_22},
45 crossref = {DBLP:conf/ih/2005},
46 bibsource = {DBLP, http://dblp.uni-trier.de}
48 @proceedings{DBLP:conf/ih/2005,
49 editor = {Mauro Barni and
50 Jordi Herrera-Joancomart\'{\i} and
51 Stefan Katzenbeisser and
52 Fernando P{\'e}rez-Gonz{\'a}lez},
53 title = {Information Hiding, 7th International Workshop, IH 2005,
54 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
55 booktitle = {Information Hiding},
56 publisher = {Springer},
57 series = {Lecture Notes in Computer Science},
60 isbn = {3-540-29039-7},
61 bibsource = {DBLP, http://dblp.uni-trier.de}
65 author = {Jessica J. Fridrich and
67 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
68 booktitle = {14th Information Hiding Conference},
71 publisher = {Springer},
72 address = {Berkeley, CA},
76 @article{DBLP:journals/tsp/DumitrescuWW03,
77 added-at = {2012-02-06T00:00:00.000+0100},
78 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
79 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
80 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
81 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
82 intrahash = {556caad9b61980d3458885153a52321c},
83 journal = {IEEE Transactions on Signal Processing},
87 timestamp = {2012-02-06T00:00:00.000+0100},
88 title = {Detection of LSB steganography via sample pair analysis.},
89 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
94 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
95 added-at = {2007-10-26T00:00:00.000+0200},
96 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
97 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
99 crossref = {DBLP:conf/mmsec/2001},
101 description = {dblp},
102 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
103 ee = {http://doi.acm.org/10.1145/1232454.1232466},
104 interhash = {de49b3b9958119616eee66f14060f47f},
105 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
106 isbn = {1-58113-393-6},
110 timestamp = {2007-10-26T00:00:00.000+0200},
111 title = {Reliable detection of LSB steganography in color and grayscale images.},
112 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
117 @proceedings{DBLP:conf/mmsec/2001,
118 editor = {Nicolas D. Georganas and
119 Radu Popescu-Zeletin},
120 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
121 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
123 booktitle = {MM{\&}Sec},
126 isbn = {1-58113-393-6},
127 bibsource = {DBLP, http://dblp.uni-trier.de}
130 @inproceedings{DBLP:conf/ih/PevnyFB10,
131 added-at = {2010-10-08T00:00:00.000+0200},
132 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
133 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
134 booktitle = {Information Hiding},
135 crossref = {DBLP:conf/ih/2010},
136 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
137 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
138 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
139 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
140 isbn = {978-3-642-16434-7},
143 publisher = {Springer},
144 series = {Lecture Notes in Computer Science},
145 timestamp = {2010-10-08T00:00:00.000+0200},
146 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
147 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
152 @proceedings{DBLP:conf/ih/2010,
153 editor = {Rainer B{\"o}hme and
154 Philip W. L. Fong and
155 Reihaneh Safavi-Naini},
156 title = {Information Hiding - 12th International Conference, IH 2010,
157 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
159 booktitle = {Information Hiding},
160 publisher = {Springer},
161 series = {Lecture Notes in Computer Science},
164 isbn = {978-3-642-16434-7},
165 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
166 bibsource = {DBLP, http://dblp.uni-trier.de}
170 @article{DBLP:journals/eswa/ChenCL10,
171 added-at = {2010-07-21T15:44:10.000+0200},
172 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
173 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
175 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
176 interhash = {bc34a5f04661fee24ee62c39e76361be},
177 intrahash = {28889a4ab329da28559f0910469f054b},
178 journal = {Expert Syst. Appl.},
182 timestamp = {2010-07-21T15:44:10.000+0200},
183 title = {High payload steganography mechanism using hybrid edge detector.},
184 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
189 @article{DBLP:journals/tifs/FillerJF11,
190 added-at = {2011-09-29T00:00:00.000+0200},
191 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
192 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
193 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
194 interhash = {b27d23ed0c9936d568e16c51378abccd},
195 intrahash = {50e43c05a74eec17524b3df8db442da5},
196 journal = {IEEE Transactions on Information Forensics and Security},
200 timestamp = {2011-09-29T00:00:00.000+0200},
201 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
202 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
209 @inproceedings{DBLP:conf/ih/Westfeld01,
210 added-at = {2011-06-28T00:00:00.000+0200},
211 author = {Westfeld, Andreas},
212 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
213 booktitle = {Information Hiding},
214 crossref = {DBLP:conf/ih/2001},
215 editor = {Moskowitz, Ira S.},
216 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
217 interhash = {e7eaa917e995dc9373f10304d3e79255},
218 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
219 isbn = {3-540-42733-3},
222 publisher = {Springer},
223 series = {Lecture Notes in Computer Science},
224 timestamp = {2011-06-28T00:00:00.000+0200},
225 title = {F5-A Steganographic Algorithm.},
226 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
231 @proceedings{DBLP:conf/ih/2001,
232 editor = {Ira S. Moskowitz},
233 title = {Information Hiding, 4th International Workshop, IHW 2001,
234 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
235 booktitle = {Information Hiding},
236 publisher = {Springer},
237 series = {Lecture Notes in Computer Science},
240 isbn = {3-540-42733-3},
241 bibsource = {DBLP, http://dblp.uni-trier.de}
244 @inproceedings{DBLP:conf/ih/KimDR06,
245 added-at = {2007-09-20T00:00:00.000+0200},
246 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
247 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
248 booktitle = {Information Hiding},
249 crossref = {DBLP:conf/ih/2006},
251 description = {dblp},
252 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
253 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
254 interhash = {399aab122b39cfd6f6e951a1b276c786},
255 intrahash = {f0324f70d62d9dfba568e393920aaa16},
256 isbn = {978-3-540-74123-7},
259 publisher = {Springer},
260 series = {Lecture Notes in Computer Science},
261 timestamp = {2007-09-20T00:00:00.000+0200},
262 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
263 url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06},
269 @proceedings{DBLP:conf/ih/2006,
270 editor = {Jan Camenisch and
271 Christian S. Collberg and
274 title = {Information Hiding, 8th International Workshop, IH 2006,
275 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
276 booktitle = {Information Hiding},
277 publisher = {Springer},
278 series = {Lecture Notes in Computer Science},
281 isbn = {978-3-540-74123-7},
282 bibsource = {DBLP, http://dblp.uni-trier.de}
285 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
286 added-at = {2007-10-26T00:00:00.000+0200},
287 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
288 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
290 crossref = {DBLP:conf/mmsec/2007},
292 description = {dblp},
293 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
294 ee = {http://doi.acm.org/10.1145/1288869.1288872},
295 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
296 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
297 isbn = {978-1-59593-857-2},
301 timestamp = {2007-10-26T00:00:00.000+0200},
302 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
303 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
307 @proceedings{DBLP:conf/mmsec/2007,
308 editor = {Deepa Kundur and
309 Balakrishnan Prabhakaran and
311 Jessica J. Fridrich},
312 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
313 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
314 booktitle = {MM{\&}Sec},
317 isbn = {978-1-59593-857-2},
318 bibsource = {DBLP, http://dblp.uni-trier.de}
321 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
322 added-at = {2010-08-21T00:00:00.000+0200},
323 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
324 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
325 booktitle = {Media Forensics and Security},
326 crossref = {DBLP:conf/mediaforensics/2010},
327 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
328 ee = {http://dx.doi.org/10.1117/12.838002},
329 interhash = {a3d2215b959361a30f0b48f15c012bc9},
330 intrahash = {3405985533dce431b5013941a2c2c2cc},
331 isbn = {978-0-8194-7934-1},
335 series = {SPIE Proceedings},
336 timestamp = {2010-08-21T00:00:00.000+0200},
337 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
338 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
344 @proceedings{DBLP:conf/mediaforensics/2010,
345 editor = {Nasir D. Memon and
349 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
350 Electronic Imaging Symposium, San Jose, CA, USA, January
351 18-20, 2010, Proceedings},
352 booktitle = {Media Forensics and Security},
354 series = {SPIE Proceedings},
357 isbn = {978-0-8194-7934-1},
358 bibsource = {DBLP, http://dblp.uni-trier.de}
361 @article{DBLP:journals/corr/abs-1112-5239,
362 author = {Jacques M. Bahi and
363 Rapha{\"e}l Couturier and
364 Christophe Guyeux and
365 Pierre-Cyrille H{\'e}am},
366 title = {Efficient and Cryptographically Secure Generation of Chaotic
367 Pseudorandom Numbers on GPU},
369 volume = {abs/1112.5239},
371 ee = {http://arxiv.org/abs/1112.5239},
372 bibsource = {DBLP, http://dblp.uni-trier.de}
376 author = {Ponomarenko, Nikolay},
377 title = {PSNR-HVS-M page},
378 OPThowpublished = {},
381 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
387 author = {Bovik, Alan C.},
389 OPThowpublished = {},
392 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
397 @InProceedings{PSECAL07,
398 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
399 title = {On between-coefficient contrast masking of DCT basis functions},
400 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
403 editor = {Li,Baoxin},
409 OPTorganization = {},
417 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
418 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
419 journal = {IEEE Signal Processing Letters},
430 @inproceedings{DBLP:conf/crypto/ShubBB82,
431 author = {Lenore Blum and
434 title = {Comparison of Two Pseudo-Random Number Generators},
435 booktitle = {CRYPTO},
438 crossref = {DBLP:conf/crypto/1982},
439 bibsource = {DBLP, http://dblp.uni-trier.de}
441 @proceedings{DBLP:conf/crypto/1982,
442 editor = {David Chaum and
445 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
446 Barbara, California, USA, August 23-25, 1982},
447 booktitle = {CRYPTO},
448 publisher = {Plenum Press, New York},
450 bibsource = {DBLP, http://dblp.uni-trier.de}
453 @inproceedings{Blum:1985:EPP:19478.19501,
454 author = {Blum, Manuel and Goldwasser, Shafi},
455 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
456 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
458 isbn = {0-387-15658-5},
459 location = {Santa Barbara, California, United States},
462 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
464 publisher = {Springer-Verlag New York, Inc.},
465 address = {New York, NY, USA},
466 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
469 @article{DBLP:journals/ejisec/FontaineG07,
470 author = {Caroline Fontaine and
472 title = {A Survey of Homomorphic Encryption for Nonspecialists},
473 journal = {EURASIP J. Information Security},
476 ee = {http://dx.doi.org/10.1155/2007/13801},
477 bibsource = {DBLP, http://dblp.uni-trier.de}
481 @article{Luo:2010:EAI:1824719.1824720,
482 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
483 title = {Edge adaptive image steganography based on LSB matching revisited},
484 journal = {Trans. Info. For. Sec.},
485 issue_date = {June 2010},
493 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
494 doi = {10.1109/TIFS.2010.2041812},
496 publisher = {IEEE Press},
497 address = {Piscataway, NJ, USA},
498 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
501 @article{Mielikainen06,
502 author = {Mielikainen, J.},
503 title = {LSB Matching Revisited},
504 journal = {Signal Processing Letters},
519 @article{Liu:2008:FMP:1284917.1285196,
520 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
521 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
522 journal = {Pattern Recogn.},
523 issue_date = {January, 2008},
531 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
532 doi = {10.1016/j.patcog.2007.06.005},
534 publisher = {Elsevier Science Inc.},
535 address = {New York, NY, USA},
536 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
541 @InProceedings{LHS08,
542 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
543 title = {Textural features based universal steganalysis},
546 booktitle = {Proc. SPIE 6819},
555 OPTorganization = {},
563 author = {Jan Kodovský and Jessica Fridrich},
564 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
567 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
576 OPTorganization = {},
582 @article{DBLP:journals/tifs/KodovskyFH12,
583 author = {Jan Kodovsk{\'y} and
584 Jessica J. Fridrich and
586 title = {Ensemble Classifiers for Steganalysis of Digital Media},
587 journal = {IEEE Transactions on Information Forensics and Security},
592 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
593 bibsource = {DBLP, http://dblp.uni-trier.de}
598 @article{Fillatre:2012:ASL:2333143.2333587,
599 author = {Fillatre, Lionel},
600 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
601 journal = {Trans. Sig. Proc.},
602 issue_date = {February 2012},
610 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
611 doi = {10.1109/TSP.2011.2174231},
613 publisher = {IEEE Press},
614 address = {Piscataway, NJ, USA},
618 @inproceedings{Tyan1993,
619 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
620 address = {{San Francisco, CA, USA}},
621 author = {Tyan, C. Y. and Wang, P. P.},
622 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
623 citeulike-article-id = {7936501},
624 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
626 posted-at = {2010-10-01 17:27:48},
628 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
634 @article{Canny:1986:CAE:11274.11275,
636 title = {A Computational Approach to Edge Detection},
637 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
638 issue_date = {June 1986},
646 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
647 doi = {10.1109/TPAMI.1986.4767851},
649 publisher = {IEEE Computer Society},
650 address = {Washington, DC, USA},
651 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
655 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
656 author = {Jessica J. Fridrich and
660 title = {Steganalysis of Content-Adaptive Steganography in Spatial
662 booktitle = {Information Hiding},
665 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
666 crossref = {DBLP:conf/ih/2011},
667 bibsource = {DBLP, http://dblp.uni-trier.de}
669 @proceedings{DBLP:conf/ih/2011,
670 editor = {Tom{\'a}s Filler and
671 Tom{\'a}s Pevn{\'y} and
674 title = {Information Hiding - 13th International Conference, IH 2011,
675 Prague, Czech Republic, May 18-20, 2011, Revised Selected
677 booktitle = {Information Hiding},
678 publisher = {Springer},
679 series = {Lecture Notes in Computer Science},
682 isbn = {978-3-642-24177-2},
683 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
684 bibsource = {DBLP, http://dblp.uni-trier.de}
687 @inproceedings{DBLP:conf/iwdw/Fridrich11,
688 author = {Jessica J. Fridrich},
689 title = {Modern Trends in Steganography and Steganalysis},
693 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
694 crossref = {DBLP:conf/iwdw/2011},
695 bibsource = {DBLP, http://dblp.uni-trier.de}
697 @proceedings{DBLP:conf/iwdw/2011,
698 editor = {Yun-Qing Shi and
700 Fernando P{\'e}rez-Gonz{\'a}lez},
701 title = {Digital Forensics and Watermarking - 10th International
702 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
703 2011, Revised Selected Papers},
705 publisher = {Springer},
706 series = {Lecture Notes in Computer Science},
709 isbn = {978-3-642-32204-4},
710 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
711 bibsource = {DBLP, http://dblp.uni-trier.de}