X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/e1c34dc36c5b5d8e9470b0baa3b5e5f80a8647e9..3cb99fa4936f62fef8a0f24880e7d9bca9c31a9e:/biblio.bib diff --git a/biblio.bib b/biblio.bib index 2ddab01..89cddc2 100644 --- a/biblio.bib +++ b/biblio.bib @@ -1,3 +1,71 @@ +@inproceedings{DBLP:conf/ih/PereiraVMMP01, + author = {Shelby Pereira and + Sviatoslav Voloshynovskiy and + Maribel Madueno and + St{\'e}phane Marchand-Maillet and + Thierry Pun}, + title = {Second Generation Benchmarking and Application Oriented + Evaluation}, + booktitle = {Information Hiding}, + year = {2001}, + pages = {340-353}, + ee = {http://dx.doi.org/10.1007/3-540-45496-9_25}, + crossref = {DBLP:conf/ih/2001}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/ih/2001, + editor = {Ira S. Moskowitz}, + title = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, + booktitle = {Information Hiding}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {2137}, + year = {2001}, + isbn = {3-540-42733-3}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{Chang20101286, +title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", +journal = "Digital Signal Processing", +volume = "20", +number = "4", +pages = "1286 - 1307", +year = "2010", +note = "", +issn = "1051-2004", +doi = "10.1016/j.dsp.2009.11.005", +url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413", +author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le", +keywords = "Security", +keywords = "Wet paper coding", +keywords = "Steganography", +keywords = "Indicator", +keywords = "Fuzzy edge detector" +} + + + +@article{Hu:2007:HPE:1282866.1282944, + author = {Hu, Liming and Cheng, H. D. and Zhang, Ming}, + title = {A high performance edge detector based on fuzzy inference rules}, + journal = {Inf. Sci.}, + issue_date = {November, 2007}, + volume = {177}, + number = {21}, + month = nov, + year = {2007}, + issn = {0020-0255}, + pages = {4768--4784}, + numpages = {17}, + url = {http://dx.doi.org/10.1016/j.ins.2007.04.001}, + doi = {10.1016/j.ins.2007.04.001}, + acmid = {1282944}, + publisher = {Elsevier Science Inc.}, + address = {New York, NY, USA}, + keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, +} @inproceedings{Dumitrescu:2005:LSB:1073170.1073176, author = {Dumitrescu, Sorina and Wu, Xiaolin}, title = {LSB steganalysis based on high-order statistics}, @@ -110,7 +178,7 @@ author = {Jessica J. Fridrich and @inproceedings{DBLP:conf/ih/PevnyFB10, added-at = {2010-10-08T00:00:00.000+0200}, - author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick}, + author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick}, biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp}, booktitle = {Information Hiding}, crossref = {DBLP:conf/ih/2010}, @@ -130,6 +198,18 @@ author = {Jessica J. Fridrich and year = 2010 } + +@Misc{Boss10, + OPTkey = {}, + author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick}, + title = {Break Our Steganographic System}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2010}, + note = { available at \url{http://www.agents.cz/boss/}}, + OPTannote = {} +} + @proceedings{DBLP:conf/ih/2010, editor = {Rainer B{\"o}hme and Philip W. L. Fong and @@ -157,7 +237,7 @@ author = {Jessica J. Fridrich and interhash = {bc34a5f04661fee24ee62c39e76361be}, intrahash = {28889a4ab329da28559f0910469f054b}, journal = {Expert Syst. Appl.}, - keywords = {dblp}, + keywords = {dblp}, number = 4, pages = {3292-3301}, timestamp = {2010-07-21T15:44:10.000+0200}, @@ -209,18 +289,6 @@ author = {Jessica J. Fridrich and year = 2001 } -@proceedings{DBLP:conf/ih/2001, - editor = {Ira S. Moskowitz}, - title = {Information Hiding, 4th International Workshop, IHW 2001, - Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - booktitle = {Information Hiding}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {2137}, - year = {2001}, - isbn = {3-540-42733-3}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} @inproceedings{DBLP:conf/ih/KimDR06, added-at = {2007-09-20T00:00:00.000+0200}, @@ -241,7 +309,7 @@ author = {Jessica J. Fridrich and series = {Lecture Notes in Computer Science}, timestamp = {2007-09-20T00:00:00.000+0200}, title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06}, + url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, volume = 4437, year = 2006 } @@ -265,7 +333,7 @@ author = {Jessica J. Fridrich and @inproceedings{DBLP:conf/mmsec/FridrichPK07, added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan}, + author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan}, biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp}, booktitle = {MMSec}, crossref = {DBLP:conf/mmsec/2007}, @@ -339,6 +407,125 @@ author = {Jessica J. Fridrich and bibsource = {DBLP, http://dblp.uni-trier.de} } +@article{DBLP:journals/corr/abs-1112-5239, + author = {Jacques M. Bahi and + Rapha{\"e}l Couturier and + Christophe Guyeux and + Pierre-Cyrille H{\'e}am}, + title = {Efficient and Cryptographically Secure Generation of Chaotic + Pseudorandom Numbers on GPU}, + journal = {CoRR}, + volume = {abs/1112.5239}, + year = {2011}, + ee = {http://arxiv.org/abs/1112.5239}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@Misc{psnrhvsm11, + author = {Ponomarenko, Nikolay}, + title = {PSNR-HVS-M page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}}, + OPTannote = {} +} + +@Misc{biqi11, + OPTkey = {}, + author = {Bovik, Alan C.}, + title = {BIQI page}, + OPThowpublished = {}, + OPTmonth = {}, + year = {2011}, + note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}}, + OPTannote = {} +} + + +@InProceedings{PSECAL07, + author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir}, + title = {On between-coefficient contrast masking of DCT basis functions}, + booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA}, + OPTpages = {}, + year = {2007}, + editor = {Li,Baoxin}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + OPTaddress = {}, + month = jan, + OPTorganization = {}, + OPTpublisher = {}, + OPTnote = {}, + OPTannote = {} +} + + +@Article{MB10, + author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad}, + title = {A Two-Step Framework for Constructing Blind Image Quality Indices}, + journal = {IEEE Signal Processing Letters}, + year = {2010}, + volume = {17}, + number = {5}, + pages = {513--516}, + month = may, +} + + + + +@inproceedings{DBLP:conf/crypto/ShubBB82, + author = {Lenore Blum and + Manuel Blum and + Mike Shub}, + title = {Comparison of Two Pseudo-Random Number Generators}, + booktitle = {CRYPTO}, + year = {1982}, + pages = {61-78}, + crossref = {DBLP:conf/crypto/1982}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/crypto/1982, + editor = {David Chaum and + Ronald L. Rivest and + Alan T. Sherman}, + title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa + Barbara, California, USA, August 23-25, 1982}, + booktitle = {CRYPTO}, + publisher = {Plenum Press, New York}, + year = {1983}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{Blum:1985:EPP:19478.19501, + author = {Blum, Manuel and Goldwasser, Shafi}, + title = {An efficient probabilistic public key encryption scheme which hides all partial information}, + booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology}, + year = {1985}, + isbn = {0-387-15658-5}, + location = {Santa Barbara, California, United States}, + pages = {289--302}, + numpages = {14}, + url = {http://dl.acm.org/citation.cfm?id=19478.19501}, + acmid = {19501}, + publisher = {Springer-Verlag New York, Inc.}, + address = {New York, NY, USA}, + keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption}, +} + +@article{DBLP:journals/ejisec/FontaineG07, + author = {Caroline Fontaine and + Fabien Galand}, + title = {A Survey of Homomorphic Encryption for Nonspecialists}, + journal = {EURASIP J. Information Security}, + volume = {2007}, + year = {2007}, + ee = {http://dx.doi.org/10.1155/2007/13801}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + @article{Luo:2010:EAI:1824719.1824720, author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, @@ -422,7 +609,7 @@ author = {Jessica J. Fridrich and @InProceedings{KF11, - author = {Jan Kodovský and Jessica Fridrich}, + author = {Jan Kodovsk{\'y} and Jessica Fridrich}, title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces}, OPTcrossref = {}, OPTkey = {}, @@ -474,4 +661,106 @@ author = {Jessica J. Fridrich and acmid = {2333587}, publisher = {IEEE Press}, address = {Piscataway, NJ, USA}, -} \ No newline at end of file +} + + +@inproceedings{Tyan1993, + abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}}, + address = {{San Francisco, CA, USA}}, + author = {Tyan, C. Y. and Wang, P. P.}, + booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}}, + citeulike-article-id = {7936501}, + keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory}, + pages = {600--605}, + posted-at = {2010-10-01 17:27:48}, + priority = {0}, + title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}}, + volume = {1}, + year = {1993} +} + + +@article{Canny:1986:CAE:11274.11275, + author = {Canny, J}, + title = {A Computational Approach to Edge Detection}, + journal = {IEEE Trans. Pattern Anal. Mach. Intell.}, + issue_date = {June 1986}, + volume = {8}, + number = {6}, + month = jun, + year = {1986}, + issn = {0162-8828}, + pages = {679--698}, + numpages = {20}, + url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851}, + doi = {10.1109/TPAMI.1986.4767851}, + acmid = {11275}, + publisher = {IEEE Computer Society}, + address = {Washington, DC, USA}, + keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis}, +} + + +@inproceedings{DBLP:conf/ih/FridrichKHG11a, + author = {Jessica J. Fridrich and + Jan Kodovsk{\'y} and + Vojtech Holub and + Miroslav Goljan}, + title = {Steganalysis of Content-Adaptive Steganography in Spatial + Domain}, + booktitle = {Information Hiding}, + year = {2011}, + pages = {102-117}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8}, + crossref = {DBLP:conf/ih/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/ih/2011, + editor = {Tom{\'a}s Filler and + Tom{\'a}s Pevn{\'y} and + Scott Craver and + Andrew D. Ker}, + title = {Information Hiding - 13th International Conference, IH 2011, + Prague, Czech Republic, May 18-20, 2011, Revised Selected + Papers}, + booktitle = {Information Hiding}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {6958}, + year = {2011}, + isbn = {978-3-642-24177-2}, + ee = {http://dx.doi.org/10.1007/978-3-642-24178-9}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{DBLP:conf/iwdw/Fridrich11, + author = {Jessica J. Fridrich}, + title = {Modern Trends in Steganography and Steganalysis}, + booktitle = {IWDW}, + year = {2011}, + pages = {1}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1}, + crossref = {DBLP:conf/iwdw/2011}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} +@proceedings{DBLP:conf/iwdw/2011, + editor = {Yun-Qing Shi and + Hyoung-Joong Kim and + Fernando P{\'e}rez-Gonz{\'a}lez}, + title = {Digital Forensics and Watermarking - 10th International + Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, + 2011, Revised Selected Papers}, + booktitle = {IWDW}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {7128}, + year = {2012}, + isbn = {978-3-642-32204-4}, + ee = {http://dx.doi.org/10.1007/978-3-642-32205-1}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + + + +