X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/chaos1.git/blobdiff_plain/3d2c65134eeb77fe5e63016dcc5578dea6b92f8c..c8f45a13d8b4d730baf96ab75e62c6b9b8575ea0:/chaos-paper.bib?ds=sidebyside diff --git a/chaos-paper.bib b/chaos-paper.bib index ff93415..bdc8bb1 100644 --- a/chaos-paper.bib +++ b/chaos-paper.bib @@ -23,15 +23,13 @@ @String{TESC = {Turkish Journal of Electrical Engineering and Computer Sciences}} %% 1989 - Cybenko -@article{DBLP:journals/jpdc/Cybenko89, +@article{Cybenko89, author = {George Cybenko}, - title = {Dynamic Load Balancing for Distributed Memory Multiprocessors}, - journal = {J. Parallel Distrib. Comput.}, - volume = {7}, - number = {2}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, year = {1989}, - pages = {279-301}, - bibsource = {DBLP, http://dblp.uni-trier.de} + pages = {303-314} } %% 1989 - Hornik @@ -108,7 +106,6 @@ year = 1998 Xin Zhou}, title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence and Neural Network}, - booktitle = {ISNN (2)}, year = {2004}, pages = {663-668}, ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}, @@ -120,15 +117,13 @@ year = 1998 editor = {Fuliang Yin and Jun Wang and Chengan Guo}, - title = {Advances in Neural Networks - ISNN 2004, International Symposium + title = {Advances in Neural Networks - International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II}, - booktitle = {ISNN (2)}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3174}, year = {2004}, - isbn = {3-540-22843-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -214,7 +209,6 @@ keywords = "Image encryption" booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, series = {IJCNN'09}, year = {2009}, - isbn = {978-1-4244-3549-4}, location = {Atlanta, Georgia, USA}, pages = {2723--2728}, numpages = {6}, @@ -243,7 +237,7 @@ number={2}, pages={ 587 - 590}, keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, doi={10.1109/TCE.2004.1309431}, -ISSN={0098-3063},} +} @article{Zhang2005759, title = "An image encryption approach based on chaotic maps", @@ -269,9 +263,8 @@ note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} @article{10.1109/CIMSiM.2010.36, author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, -journal ={Computational Intelligence, Modelling and Simulation, International Conference on}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, volume = {0}, -isbn = {978-0-7695-4262-1}, year = {2010}, pages = {15-20}, doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, @@ -288,11 +281,11 @@ volume={}, number={}, pages={3352 -3357}, keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;}, -doi={10.1109/IJCNN.2008.4634274}, -ISSN={1098-7576},} +doi={10.1109/IJCNN.2008.4634274} +} @INPROCEEDINGS{guyeux10ter, - author = {Bahi, Jacques and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Guyeux, Christophe}, title = {A new chaos-based watermarking algorithm}, booktitle = {SECRYPT'10, International Conference on Security and Cryptography}, @@ -355,7 +348,7 @@ and Cryptography}, } @INPROCEEDINGS{gfb10:ip, - author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques}, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, @@ -409,7 +402,6 @@ author = {Liu Shaohui and Yao Hongxun and Gao Wen}, title = {Neural network based steganalysis in still images}, journal ={Multimedia and Expo, IEEE International Conference on}, volume = {2}, -isbn = {0-7803-7965-9}, year = {2003}, pages = {509-512}, doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, @@ -422,10 +414,9 @@ inhal = {no}, domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, equipe = {and}, classement = {ACTI}, -author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, title = {Building a Chaotic Proven Neural Network}, booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, -pages = {***--***}, address = {Maldives, Maldives}, month = may, year = 2011,