- title = {Dynamic Load Balancing for Distributed Memory Multiprocessors},\r
- journal = {J. Parallel Distrib. Comput.},\r
- volume = {7},\r
- number = {2},\r
+ title = {Approximation by Superpositions of a Sigmoidal function},\r
+ journal = {Mathematics of Control, Signals and Systems},\r
+ volume = {2},\r
Xin Zhou},\r
title = {A Novel Wavelet Image Watermarking Scheme Combined with\r
Chaos Sequence and Neural Network},\r
Xin Zhou},\r
title = {A Novel Wavelet Image Watermarking Scheme Combined with\r
Chaos Sequence and Neural Network},\r
on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,\r
Part II},\r
on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,\r
Part II},\r
publisher = {Springer},\r
series = {Lecture Notes in Computer Science},\r
volume = {3174},\r
year = {2004},\r
publisher = {Springer},\r
series = {Lecture Notes in Computer Science},\r
volume = {3174},\r
year = {2004},\r
location = {Atlanta, Georgia, USA},\r
pages = {2723--2728},\r
numpages = {6},\r
location = {Atlanta, Georgia, USA},\r
pages = {2723--2728},\r
numpages = {6},\r
pages={ 587 - 590},\r
keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},\r
doi={10.1109/TCE.2004.1309431},\r
pages={ 587 - 590},\r
keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},\r
doi={10.1109/TCE.2004.1309431},\r
@article{10.1109/CIMSiM.2010.36,\r
author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},\r
title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},\r
@article{10.1109/CIMSiM.2010.36,\r
author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},\r
title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},\r
-journal ={Computational Intelligence, Modelling and Simulation, International Conference on},\r
+journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},\r
number={},\r
pages={3352 -3357},\r
keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;},\r
number={},\r
pages={3352 -3357},\r
keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;},\r
- author = {Bahi, Jacques and Guyeux, Christophe},\r
+ author = {Bahi, Jacques M. and Guyeux, Christophe},\r
title = {A new chaos-based watermarking algorithm},\r
booktitle = {SECRYPT'10, International Conference on Security \r
and Cryptography},\r
title = {A new chaos-based watermarking algorithm},\r
booktitle = {SECRYPT'10, International Conference on Security \r
and Cryptography},\r
- author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},\r
+ author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},\r
title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},\r
booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and\r
Multimedia Signal Processing},\r
title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},\r
booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and\r
Multimedia Signal Processing},\r
title = {Neural network based steganalysis in still images},\r
journal ={Multimedia and Expo, IEEE International Conference on},\r
volume = {2},\r
title = {Neural network based steganalysis in still images},\r
journal ={Multimedia and Expo, IEEE International Conference on},\r
volume = {2},\r
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
equipe = {and},\r
classement = {ACTI},\r
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
equipe = {and},\r
classement = {ACTI},\r
-author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},\r
+author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},\r
title = {Building a Chaotic Proven Neural Network},\r
booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},\r
title = {Building a Chaotic Proven Neural Network},\r
booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},\r