X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/5e6f9e49a26cec4970434722a595a7b44197120f..69853fcf95c4cb941d699fd5f1ca32540189b8a9:/biblio.bib?ds=sidebyside diff --git a/biblio.bib b/biblio.bib index ba24607..89cddc2 100644 --- a/biblio.bib +++ b/biblio.bib @@ -1,3 +1,71 @@ +@inproceedings{DBLP:conf/ih/PereiraVMMP01, + author = {Shelby Pereira and + Sviatoslav Voloshynovskiy and + Maribel Madueno and + St{\'e}phane Marchand-Maillet and + Thierry Pun}, + title = {Second Generation Benchmarking and Application Oriented + Evaluation}, + booktitle = {Information Hiding}, + year = {2001}, + pages = {340-353}, + ee = {http://dx.doi.org/10.1007/3-540-45496-9_25}, + crossref = {DBLP:conf/ih/2001}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/ih/2001, + editor = {Ira S. Moskowitz}, + title = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + booktitle = {Information Hiding}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {2137}, + year = {2001}, + isbn = {3-540-42733-3}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{Chang20101286, +title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", +journal = "Digital Signal Processing", +volume = "20", +number = "4", +pages = "1286 - 1307", +year = "2010", +note = "", +issn = "1051-2004", +doi = "10.1016/j.dsp.2009.11.005", +url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413", +author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le", +keywords = "Security", +keywords = "Wet paper coding", +keywords = "Steganography", +keywords = "Indicator", +keywords = "Fuzzy edge detector" +} + + + +@article{Hu:2007:HPE:1282866.1282944, + author = {Hu, Liming and Cheng, H. D. and Zhang, Ming}, + title = {A high performance edge detector based on fuzzy inference rules}, + journal = {Inf. Sci.}, + issue_date = {November, 2007}, + volume = {177}, + number = {21}, + month = nov, + year = {2007}, + issn = {0020-0255}, + pages = {4768--4784}, + numpages = {17}, + url = {http://dx.doi.org/10.1016/j.ins.2007.04.001}, + doi = {10.1016/j.ins.2007.04.001}, + acmid = {1282944}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, +} @inproceedings{Dumitrescu:2005:LSB:1073170.1073176, author = {Dumitrescu, Sorina and Wu, Xiaolin}, title = {LSB steganalysis based on high-order statistics}, @@ -110,7 +178,7 @@ author = {Jessica J. Fridrich and @inproceedings{DBLP:conf/ih/PevnyFB10, added-at = {2010-10-08T00:00:00.000+0200}, - author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick}, + author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick}, biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp}, booktitle = {Information Hiding}, crossref = {DBLP:conf/ih/2010}, @@ -130,6 +198,18 @@ author = {Jessica J. Fridrich and year = 2010 } + +@Misc{Boss10, + OPTkey = {}, + author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick}, + title = {Break Our Steganographic System}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2010}, + note = { available at \url{http://www.agents.cz/boss/}}, + OPTannote = {} +} + @proceedings{DBLP:conf/ih/2010, editor = {Rainer B{\"o}hme and Philip W. L. Fong and @@ -157,7 +237,7 @@ author = {Jessica J. Fridrich and interhash = {bc34a5f04661fee24ee62c39e76361be}, intrahash = {28889a4ab329da28559f0910469f054b}, journal = {Expert Syst. Appl.}, - keywords = {dblp}, + keywords = {dblp}, number = 4, pages = {3292-3301}, timestamp = {2010-07-21T15:44:10.000+0200}, @@ -209,18 +289,6 @@ author = {Jessica J. Fridrich and year = 2001 } -@proceedings{DBLP:conf/ih/2001, - editor = {Ira S. Moskowitz}, - title = {Information Hiding, 4th International Workshop, IHW 2001, - Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - booktitle = {Information Hiding}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {2137}, - year = {2001}, - isbn = {3-540-42733-3}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} @inproceedings{DBLP:conf/ih/KimDR06, added-at = {2007-09-20T00:00:00.000+0200}, @@ -241,7 +309,7 @@ author = {Jessica J. Fridrich and series = {Lecture Notes in Computer Science}, timestamp = {2007-09-20T00:00:00.000+0200}, title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06}, + url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, volume = 4437, year = 2006 } @@ -265,7 +333,7 @@ author = {Jessica J. Fridrich and @inproceedings{DBLP:conf/mmsec/FridrichPK07, added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan}, + author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan}, biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp}, booktitle = {MMSec}, crossref = {DBLP:conf/mmsec/2007}, @@ -339,6 +407,125 @@ author = {Jessica J. Fridrich and bibsource = {DBLP, http://dblp.uni-trier.de} } +@article{DBLP:journals/corr/abs-1112-5239, + author = {Jacques M. Bahi and + Rapha{\"e}l Couturier and + Christophe Guyeux and + Pierre-Cyrille H{\'e}am}, + title = {Efficient and Cryptographically Secure Generation of Chaotic + Pseudorandom Numbers on GPU}, + journal = {CoRR}, + volume = {abs/1112.5239}, + year = {2011}, + ee = {http://arxiv.org/abs/1112.5239}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@Misc{psnrhvsm11, + author = {Ponomarenko, Nikolay}, + title = {PSNR-HVS-M page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}}, + OPTannote = {} +} + +@Misc{biqi11, + OPTkey = {}, + author = {Bovik, Alan C.}, + title = {BIQI page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}}, + OPTannote = {} +} + + +@InProceedings{PSECAL07, + author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir}, + title = {On between-coefficient contrast masking of DCT basis functions}, + booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA}, + OPTpages = {}, + year = {2007}, + editor = {Li,Baoxin}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + month = jan, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + + +@Article{MB10, + author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad}, + title = {A Two-Step Framework for Constructing Blind Image Quality Indices}, + journal = {IEEE Signal Processing Letters}, + year = {2010}, + volume = {17}, + number = {5}, + pages = {513--516}, + month = may, +} + + + + +@inproceedings{DBLP:conf/crypto/ShubBB82, + author = {Lenore Blum and + Manuel Blum and + Mike Shub}, + title = {Comparison of Two Pseudo-Random Number Generators}, + booktitle = {CRYPTO}, + year = {1982}, + pages = {61-78}, + crossref = {DBLP:conf/crypto/1982}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/crypto/1982, + editor = {David Chaum and + Ronald L. Rivest and + Alan T. Sherman}, + title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa + Barbara, California, USA, August 23-25, 1982}, + booktitle = {CRYPTO}, + publisher = {Plenum Press, New York}, + year = {1983}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{Blum:1985:EPP:19478.19501, + author = {Blum, Manuel and Goldwasser, Shafi}, + title = {An efficient probabilistic public key encryption scheme which hides all partial information}, + booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology}, + year = {1985}, + isbn = {0-387-15658-5}, + location = {Santa Barbara, California, United States}, + pages = {289--302}, + numpages = {14}, + url = {http://dl.acm.org/citation.cfm?id=19478.19501}, + acmid = {19501}, + publisher = {Springer-Verlag New York, Inc.}, + address = {New York, NY, USA}, + keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption}, +} + +@article{DBLP:journals/ejisec/FontaineG07, + author = {Caroline Fontaine and + Fabien Galand}, + title = {A Survey of Homomorphic Encryption for Nonspecialists}, + journal = {EURASIP J. Information Security}, + volume = {2007}, + year = {2007}, + ee = {http://dx.doi.org/10.1155/2007/13801}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + @article{Luo:2010:EAI:1824719.1824720, author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, @@ -422,7 +609,7 @@ author = {Jessica J. Fridrich and @InProceedings{KF11, - author = {Jan Kodovský and Jessica Fridrich}, + author = {Jan Kodovsk{\'y} and Jessica Fridrich}, title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces}, OPTcrossref = {}, OPTkey = {},