X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/chaos1.git/blobdiff_plain/b5b552471fad6f08372d929ce248adc106c93a8e..c8f45a13d8b4d730baf96ab75e62c6b9b8575ea0:/chaos-paper.bib?ds=inline diff --git a/chaos-paper.bib b/chaos-paper.bib index 0ed0096..bdc8bb1 100644 --- a/chaos-paper.bib +++ b/chaos-paper.bib @@ -20,18 +20,16 @@ @String{IEEETPDS = {IEEE Trans. Parallel Distrib. Systems}} @String{IEEETPAMI = {IEEE Trans. Pattern Analysis Machine Intelligence}} @String{IEEETSMC = {IEEE Trans. on Systems, Man and Cybernetics}} - +@String{TESC = {Turkish Journal of Electrical Engineering and Computer Sciences}} %% 1989 - Cybenko -@article{DBLP:journals/jpdc/Cybenko89, +@article{Cybenko89, author = {George Cybenko}, - title = {Dynamic Load Balancing for Distributed Memory Multiprocessors}, - journal = {J. Parallel Distrib. Comput.}, - volume = {7}, - number = {2}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, year = {1989}, - pages = {279-301}, - bibsource = {DBLP, http://dblp.uni-trier.de} + pages = {303-314} } %% 1989 - Hornik @@ -68,10 +66,10 @@ author = "K. Aihara and T. Takabe and M. Toyoda" @inproceedings {lecun-98b, original = "orig/lecun-98b.ps.gz", -author = "LeCun, Y. and Bottou, L. and Orr, G. and Muller, K.", +author = "LeCun, Yann and Bottou, L\'eon. and Orr, Genevieve B. and Muller, Klaus-Robert", title = "Efficient BackProp", booktitle = "Neural Networks: Tricks of the trade", -editor = "Orr, G. and Muller K.", +editor = "Orr, Genevieve B. and Muller Klaus-Robert", publisher = "Springer", year = 1998 } @@ -108,7 +106,6 @@ year = 1998 Xin Zhou}, title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence and Neural Network}, - booktitle = {ISNN (2)}, year = {2004}, pages = {663-668}, ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}, @@ -120,15 +117,13 @@ year = 1998 editor = {Fuliang Yin and Jun Wang and Chengan Guo}, - title = {Advances in Neural Networks - ISNN 2004, International Symposium + title = {Advances in Neural Networks - International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II}, - booktitle = {ISNN (2)}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3174}, year = {2004}, - isbn = {3-540-22843-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -188,7 +183,7 @@ keywords = "Image encryption" affiliation = {Chongqing University College of Computer Science 400044 Chongqing China}, title = {A novel Hash algorithm construction based on chaotic neural network}, journal = {Neural Computing and Applications}, - publisher = {Springer London}, + publisher = {Springer}, issn = {0941-0643}, keyword = {Computer Science}, pages = {1-9}, @@ -201,7 +196,7 @@ keywords = "Image encryption" author = {Ilker Dalkiran and Kenan Danisman}, affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey}, title = {Artificial neural network based chaotic generator for cryptology}, - journal = {Turk. J.Elec. Eng. \& Comp. Sci.}, + journal = TESC, volume = {18}, number = {2}, pages = {225-240}, @@ -214,21 +209,19 @@ keywords = "Image encryption" booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, series = {IJCNN'09}, year = {2009}, - isbn = {978-1-4244-3549-4}, location = {Atlanta, Georgia, USA}, pages = {2723--2728}, numpages = {6}, - url = {http://portal.acm.org/citation.cfm?id=1704555.1704664}, - acmid = {1704664}, - publisher = {IEEE Press}, - address = {Piscataway, NJ, USA}, + publisher = {IEEE Press} } + + @ARTICLE{Sullivan06steganalysisfor, - author = {Kenneth Sullivan and Upamanyu Madhow and Shivkumar Ch and B. S. Manjunath}, + author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. }, title = {Steganalysis for Markov cover data with applications to images}, - journal = {IEEE Trans. Inform. Forensics and Security}, + journal = {IEEE Transactions on Information Forensics and Security}, year = {2006}, volume = {1}, pages = {275--287} @@ -244,7 +237,7 @@ number={2}, pages={ 587 - 590}, keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, doi={10.1109/TCE.2004.1309431}, -ISSN={0098-3063},} +} @article{Zhang2005759, title = "An image encryption approach based on chaotic maps", @@ -261,18 +254,17 @@ author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang" @misc{Gray47, year=1953, -author = "F. Gray", +author = "Gray, Frank", title = "Pulse code communication", -note = "US Patent 2,632,058, March 17 1953,(filed November 13 1947)"} +note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} @article{10.1109/CIMSiM.2010.36, author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, -journal ={Computational Intelligence, Modelling and Simulation, International Conference on}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, volume = {0}, -isbn = {978-0-7695-4262-1}, year = {2010}, pages = {15-20}, doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, @@ -289,13 +281,14 @@ volume={}, number={}, pages={3352 -3357}, keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;}, -doi={10.1109/IJCNN.2008.4634274}, -ISSN={1098-7576},} +doi={10.1109/IJCNN.2008.4634274} +} @INPROCEEDINGS{guyeux10ter, - author = {Bahi, Jacques and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Guyeux, Christophe}, title = {A new chaos-based watermarking algorithm}, - booktitle = {SECRYPT'10, Int. conf. on security and cryptography}, + booktitle = {SECRYPT'10, International Conference on Security +and Cryptography}, year = {2010}, pages = {455--458}, address = {Athens, Greece}, @@ -308,7 +301,7 @@ ISSN={1098-7576},} } @ARTICLE{Banks92, - author = {J. Banks and J. Brooks and G. Cairns and P. Stacey}, + author = {Banks, John and J. Brooks and G. Cairns and P. Stacey}, title = {On Devaney's Definition of Chaos}, journal = {Amer. Math. Monthly}, year = {1992}, @@ -355,9 +348,9 @@ ISSN={1098-7576},} } @INPROCEEDINGS{gfb10:ip, - author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques}, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, - booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and + booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2010}, pages = {208--211}, @@ -372,7 +365,7 @@ ISSN={1098-7576},} @ARTICLE{Adler65, author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, title = {Topological entropy}, - journal = {Trans. Amer. Math. Soc.}, + journal = {Transactions of the American Mathematical Society}, year = {1965}, volume = {114}, pages = {309-319}, @@ -381,9 +374,9 @@ ISSN={1098-7576},} } @ARTICLE{Bowen, - author = {R. Bowen}, + author = {Rufus Bowen}, title = {Entropy for group endomorphisms and homogeneous spaces}, - journal = {Trans. Amer. Math. Soc.}, + journal = {Transactions of the American Mathematical Society}, year = {1971}, volume = {153}, pages = {401-414}, @@ -409,7 +402,6 @@ author = {Liu Shaohui and Yao Hongxun and Gao Wen}, title = {Neural network based steganalysis in still images}, journal ={Multimedia and Expo, IEEE International Conference on}, volume = {2}, -isbn = {0-7803-7965-9}, year = {2003}, pages = {509-512}, doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, @@ -422,10 +414,9 @@ inhal = {no}, domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, equipe = {and}, classement = {ACTI}, -author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, title = {Building a Chaotic Proven Neural Network}, booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, -pages = {***--***}, address = {Maldives, Maldives}, month = may, year = 2011,