1 \newcommand{\etalchar}[1]{$^{#1}$}
2 \begin{thebibliography}{CCVHG16}
4 \bibitem[AAG{\etalchar{+}}15]{aagc+15:ip}
5 Bassam AlKindy, Bashar Al{-}Nuaimi, Christophe Guyeux, Jean{-}Fran{\c{c}}ois
6 Couchot, Michel Salomon, Reem Alsrraj, and Laurent Philippe.
7 \newblock Binary particle swarm optimization versus hybrid genetic algorithm
8 for inferring well supported phylogenetic trees.
9 \newblock In Claudia Angelini, Paola M.~V. Rancoita, and Stefano Rovetta,
10 editors, {\em Computational Intelligence Methods for Bioinformatics and
11 Biostatistics - 12th International Meeting, {CIBB} 2015, Naples, Italy,
12 September 10-12, 2015, Revised Selected Papers}, volume 9874 of {\em Lecture
13 Notes in Computer Science}, pages 165--179. Springer, 2015.
15 \bibitem[ABCVS05]{abcvs05}
16 A.~Abbas, J.~M. Bahi, S.~Contassot-Vivier, and M.~Salomon.
17 \newblock Mixing synchronism / asynchronism in discrete-state discrete-time
19 \newblock In {\em 4th Int. Conf. on Engineering Applications and Computational
20 Algorithms, DCDIS'2005}, pages 524--529, Guelph, Canada, July 2005.
21 \newblock ISSN 1492-8760.
23 \bibitem[ACGS13]{acgs13:onp}
24 Bassam Alkindy, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel
26 \newblock Finding the core-genes of chloroplast species.
27 \newblock Journ\'ees SeqBio 2013, Montpellier, November 2013.
29 \bibitem[BCC{\etalchar{+}}15]{accfg15:ip}
30 B.~Al Bouna, J.~F. Couchot, R.~Couturier, Y.~A. Fadil, and C.~Guyeux.
31 \newblock Performance study of steganalysis techniques.
32 \newblock In {\em Applied Research in Computer Science and Engineering (ICAR),
33 2015 International Conference on}, pages 1--7, Lebanon, October 2015.
35 \bibitem[BCF{\etalchar{+}}13]{bcfg+13:ip}
36 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, Christophe Guyeux, and
38 \newblock Quality studies of an invisible chaos-based watermarking scheme with
40 \newblock In {\em IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding
41 and Multimedia Signal Processing}, pages 547--550, Beijing, China, October
44 \bibitem[BCFG12a]{bcfg12a:ip}
45 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
46 \newblock Application of steganography for anonymity through the internet.
47 \newblock In {\em IHTIAP'2012, 1-st Workshop on Information Hiding Techniques
48 for Internet Anonymity and Privacy}, pages 96--101, Venice, Italy, June 2012.
50 \bibitem[BCFG12b]{bcfg12b:ip}
51 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
52 \newblock A robust data hiding process contributing to the development of a
54 \newblock In {\em INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, pages
55 71--76, Venice, Italy, June 2012.
57 \bibitem[BCG11a]{bcg11:ip}
58 Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
59 \newblock Performance analysis of a keyed hash function based on discrete and
60 chaotic proven iterations.
61 \newblock In {\em INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
62 pages 52--57, Luxembourg, Luxembourg, June 2011.
63 \newblock Best paper award.
65 \bibitem[BCG11b]{bcg11b:ip}
66 Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
67 \newblock Steganography: a class of algorithms having secure properties.
68 \newblock In {\em IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information
69 Hiding and Multimedia Signal Processing}, pages 109--112, Dalian, China,
72 \bibitem[BCG12a]{bcg12:ij}
73 Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
74 \newblock Quality analysis of a chaotic proven keyed hash function.
75 \newblock {\em International Journal On Advances in Internet Technology},
78 \bibitem[BCG12b]{bcg11:ij}
79 Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
80 \newblock Steganography: a class of secure and robust algorithms.
81 \newblock {\em The Computer Journal}, 55(6):653--666, 2012.
83 \bibitem[BCG16]{DBLP:conf/secrypt/MohammedCG16}
84 Mohammed Bakiri, Jean{-}Fran{\c{c}}ois Couchot, and Christophe Guyeux.
85 \newblock {FPGA} implementation of f2-linear pseudorandom number generators
86 based on zynq mpsoc: {A} chaotic iterations post processing case study.
87 \newblock In Christian Callegari, Marten van Sinderen, Panagiotis~G.
88 Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, and
89 Mohammad~S. Obaidat, editors, {\em Proceedings of the 13th International
90 Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume
91 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.}, pages 302--309. SciTePress,
94 \bibitem[BCGR11]{bcgr11:ip}
95 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Adrien Richard.
96 \newblock On the link between strongly connected iteration graphs and chaotic
97 boolean discrete-time dynamical systems.
98 \newblock In {\em FCT'11, 18th Int. Symp. on Fundamentals of Computation
99 Theory}, volume 6914 of {\em LNCS}, pages 126--137, Oslo, Norway, August
102 \bibitem[BCGS12]{bcgs12:ij}
103 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel Salomon.
104 \newblock Neural networks and chaos: Construction, evaluation of chaotic
105 networks, and prediction of chaos with multilayer feedforward network.
106 \newblock {\em Chaos, An Interdisciplinary Journal of Nonlinear Science},
107 22(1):013122--1 -- 013122--9, March 2012.
110 \bibitem[BCGW11]{bcgw11:ip}
111 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Qianxue Wang.
112 \newblock Class of trustworthy pseudo random number generators.
113 \newblock In {\em INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
114 pages 72--77, Luxembourg, Luxembourg, June 2011.
116 \bibitem[BCVC10]{BCVC10:ir}
117 J.~M. Bahi, S.~Contassot-Vivier, and J.-F. Couchot.
118 \newblock Convergence results of combining synchronism and asynchronism for
119 discrete-state discrete-time dynamic network.
120 \newblock Research Report RR2010-02, LIFC - Laboratoire d’{I}nformatique de
121 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010.
123 \bibitem[BDCC15]{BDCC16}
124 Ahmad~W. Bitar, Rony Darazi, Jean-Fran{\c{c}}ois Couchot, and Rapha{\"e}l
126 \newblock Blind digital watermarking in pdf documents using spread transform
128 \newblock {\em Multimedia Tools and Applications}, pages 1--19, 2015.
130 \bibitem[CCFG16]{ccfg16:ip}
131 Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra~Ahmed Fadil, and
133 \newblock A second order derivatives based approach for steganography.
134 \newblock In {\em Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
135 pages 424--431, Lisbon, July 2016.
137 \bibitem[CCG15]{ccg15:ij}
138 Jean{-}Fran{\c{c}}ois Couchot, Rapha{\"{e}}l Couturier, and Christophe Guyeux.
139 \newblock {STABYLO:} steganography with adaptive, bbs, and binary embedding at
141 \newblock {\em Annales des T{\'{e}}l{\'{e}}communications}, 70(9-10):441--449,
144 \bibitem[CCVHG16]{ccgh16}
145 Jean-Fran\c{c}ois Couchot, Sylvain Contassot-Vivier, Pierre-Cyrille H\'eam, and
147 \newblock Random walk in a n-cube without hamiltonian cycle to chaotic
148 pseudorandom number generation: Theoretical and practical considerations.
149 \newblock {\em International Journal of Bifurcation and Chaos}, 2016.
150 \newblock Accepted on Oct 2016.
152 \bibitem[CDS12]{cds12:ip}
153 Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon.
154 \newblock Suitability of artificial neural network for {MEMS}-based flow
156 \newblock In Julien Bourgeois and Michel de~Labachelerie, editors, {\em dMEMS
157 2012, Workshop on design, control and software implementation for distributed
158 MEMS}, pages 1--6, Besan\c{c}on, France, April 2012. IEEE CPS.
160 \bibitem[CDS13]{cds13:ij}
161 Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon.
162 \newblock Active {MEMS}-based flow control using artificial neural network.
163 \newblock {\em Mechatronics}, 23(7):898--905, October 2013.
164 \newblock Available online.
166 \bibitem[CHG{\etalchar{+}}14a]{chgw+14:oip}
167 Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue
168 Wang, and Jacques Bahi.
169 \newblock Pseudorandom number generators with balanced gray codes.
170 \newblock In {\em Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
171 pages 469--475, Vienna, Austria, August 2014.
173 \bibitem[CHG{\etalchar{+}}14b]{chgw+14:onp}
174 Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue
175 Wang, and Jacques Bahi.
176 \newblock Traversing a n-cube without balanced hamiltonian cycle to generate
177 pseudorandom numbers.
178 \newblock 15-th Mons Theoretical Computer Science Days (15e Journ\'ees
179 Montoises d'Informatique Th\'eorique), Nancy, France, September 2014.
181 \bibitem[Cou10]{Cou10:ir}
183 \newblock Formal {C}onvergence {P}roof for {D}iscrete {D}ynamical {S}ystems.
184 \newblock Research Report RR2010-03, LIFC - Laboratoire d’{I}nformatique de
185 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010.
187 \bibitem[FCCG15]{fccg15:ip}
188 Yousra~Ahmed Fadil, Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, and
190 \newblock Steganalyzer performances in operational contexts.
191 \newblock In {\em IIH-MSP 2015, 11th Int. Conf. on Intelligent Information
192 Hiding and Multimedia Signal Processing}, pages 429--432, Adelaide,
193 Australia, September 2015.
195 \bibitem[FGB11]{fgb11:ip}
196 Nicolas Friot, Christophe Guyeux, and Jacques Bahi.
197 \newblock Chaotic iterations for steganography - stego-security and
199 \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2011,
200 Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The
201 International Joint Conference on e-Business and Telecommunications}, pages
202 218--227, Sevilla, Spain, July 2011. SciTePress.
204 \bibitem[Guy10]{guyeuxphd}
206 \newblock {\em Le désordre des it\'erations chaotiques et leur utilit\'e en
207 sécurit\'e informatique}.
208 \newblock Th\`ese de {D}octorat, LIFC, Universit\'e de Franche-Comt\'e, 13
210 \newblock Rapporteurs~: Pascale Charpin, Directrice de Recherche,
211 INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri,
212 Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie,
213 Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger,
214 Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur,
215 Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau.
216 Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté.
218 \bibitem[Hol03]{Hol03}
220 \newblock {\em The SPIN Model Checker: Primer and Reference Manual}.
221 \newblock Addison-Wesley, Pearson Education, 2003.
223 \bibitem[KCM16]{kcm16:ip}
224 N.~Khernane, J.-F. Couchot, and A.~Mostefaoui.
225 \newblock Maximizing network lifetime in wireless video sensor networks under
227 \newblock In {\em MOBIWAC 2016: The 14th ACM* International Symposium on
228 Mobility Management and Wireless Access}, November 2016.
230 \bibitem[ZS04]{ZanSup04}
231 A.~J.~van Zanten and I.~N. Suparta.
232 \newblock Totally balanced and exponentially balanced gray codes.
233 \newblock {\em Discrete Analysis and Operational Research}, 11:81--98, 2004.
235 \end{thebibliography}