X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/df4d1d843c37342838b487163589f57a1ed6e28e..HEAD:/biblioand.bib?ds=inline diff --git a/biblioand.bib b/biblioand.bib index b1d4b0b..c481524 100644 --- a/biblioand.bib +++ b/biblioand.bib @@ -1,6 +1,23 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 +@article{LiFengyongZhang14, +year={2014}, +issn={0003-4347}, +journal={annals of telecommunications - annales des t{\'e}l{\'e}communications}, +volume={69}, +number={7-8}, +doi={10.1007/s12243-013-0415-2}, +title={Adaptive JPEG steganography with new distortion function}, +url={http://dx.doi.org/10.1007/s12243-013-0415-2}, +publisher={Springer Paris}, +keywords={Steganography; Distortion function; Steganalysis}, +author={Li, Fengyong and Zhang, Xinpeng and Yu, Jiang and Shen, Wenfeng}, +pages={431-440}, +language={English} +} + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -591,9 +608,8 @@ language={English} @inproceedings{conf/wifs/HolubF12, added-at = {2013-01-23T00:00:00.000+0100}, author = {Holub, Vojtech and Fridrich, Jessica J.}, - biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, - booktitle = {WIFS}, - crossref = {conf/wifs/2012}, + booktitle = {2012 {IEEE} International Workshop on Information Forensics and Security, Tenerife, Spain}, + month = dec, ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, interhash = {cbef658a6868216eef585dd759ae0668}, intrahash = {a685b4b8b521ac99734fb52c064ca994}, @@ -610,6 +626,7 @@ language={English} + @article{FillerJF11, author = {Tom{\'a}s Filler and Jan Judas and @@ -1396,3 +1413,28 @@ keywords = "Fuzzy edge detector" } + + +@inproceedings{DBLP:dblp_conf/mediaforensics/KodovskyPF10, + author = {Jan Kodovský and + Tomás Pevný and + Jessica J. Fridrich}, + title = {Modern steganalysis can detect YASS.}, + booktitle = {Media Forensics and Security}, + year = {2010}, + pages = {754102}, + ee = {http://dx.doi.org/10.1117/12.838768} +} + + + +@article{liu2014syndrome, + title={Syndrome trellis codes based on minimal span generator matrix}, + author={Liu, Weiwei and Liu, Guangjie and Dai, Yuewei}, + journal={annals of telecommunications-annales des t{\'e}l{\'e}communications}, + volume={69}, + number={7-8}, + pages={403--416}, + year={2014}, + publisher={Springer} +} \ No newline at end of file