\newcommand{\etalchar}[1]{$^{#1}$} \begin{thebibliography}{CCVHG16} \bibitem[AAG{\etalchar{+}}15]{aagc+15:ip} Bassam AlKindy, Bashar Al{-}Nuaimi, Christophe Guyeux, Jean{-}Fran{\c{c}}ois Couchot, Michel Salomon, Reem Alsrraj, and Laurent Philippe. \newblock Binary particle swarm optimization versus hybrid genetic algorithm for inferring well supported phylogenetic trees. \newblock In Claudia Angelini, Paola M.~V. Rancoita, and Stefano Rovetta, editors, {\em Computational Intelligence Methods for Bioinformatics and Biostatistics - 12th International Meeting, {CIBB} 2015, Naples, Italy, September 10-12, 2015, Revised Selected Papers}, volume 9874 of {\em Lecture Notes in Computer Science}, pages 165--179. Springer, 2015. \bibitem[ABCVS05]{abcvs05} A.~Abbas, J.~M. Bahi, S.~Contassot-Vivier, and M.~Salomon. \newblock Mixing synchronism / asynchronism in discrete-state discrete-time dynamic networks. \newblock In {\em 4th Int. Conf. on Engineering Applications and Computational Algorithms, DCDIS'2005}, pages 524--529, Guelph, Canada, July 2005. \newblock ISSN 1492-8760. \bibitem[ACGS13]{acgs13:onp} Bassam Alkindy, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel Salomon. \newblock Finding the core-genes of chloroplast species. \newblock Journ\'ees SeqBio 2013, Montpellier, November 2013. \bibitem[BCC{\etalchar{+}}15]{accfg15:ip} B.~Al Bouna, J.~F. Couchot, R.~Couturier, Y.~A. Fadil, and C.~Guyeux. \newblock Performance study of steganalysis techniques. \newblock In {\em Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on}, pages 1--7, Lebanon, October 2015. \bibitem[BCF{\etalchar{+}}13]{bcfg+13:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, Christophe Guyeux, and Kamel Mazouzi. \newblock Quality studies of an invisible chaos-based watermarking scheme with message extraction. \newblock In {\em IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 547--550, Beijing, China, October 2013. \bibitem[BCFG12a]{bcfg12a:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux. \newblock Application of steganography for anonymity through the internet. \newblock In {\em IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy}, pages 96--101, Venice, Italy, June 2012. \bibitem[BCFG12b]{bcfg12b:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux. \newblock A robust data hiding process contributing to the development of a semantic web. \newblock In {\em INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, pages 71--76, Venice, Italy, June 2012. \bibitem[BCG11a]{bcg11:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux. \newblock Performance analysis of a keyed hash function based on discrete and chaotic proven iterations. \newblock In {\em INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet}, pages 52--57, Luxembourg, Luxembourg, June 2011. \newblock Best paper award. \bibitem[BCG11b]{bcg11b:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux. \newblock Steganography: a class of algorithms having secure properties. \newblock In {\em IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 109--112, Dalian, China, October 2011. \bibitem[BCG12a]{bcg12:ij} Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux. \newblock Quality analysis of a chaotic proven keyed hash function. \newblock {\em International Journal On Advances in Internet Technology}, 5(1):26--33, 2012. \bibitem[BCG12b]{bcg11:ij} Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux. \newblock Steganography: a class of secure and robust algorithms. \newblock {\em The Computer Journal}, 55(6):653--666, 2012. \bibitem[BCG16]{DBLP:conf/secrypt/MohammedCG16} Mohammed Bakiri, Jean{-}Fran{\c{c}}ois Couchot, and Christophe Guyeux. \newblock {FPGA} implementation of f2-linear pseudorandom number generators based on zynq mpsoc: {A} chaotic iterations post processing case study. \newblock In Christian Callegari, Marten van Sinderen, Panagiotis~G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, and Mohammad~S. Obaidat, editors, {\em Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.}, pages 302--309. SciTePress, 2016. \bibitem[BCGR11]{bcgr11:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Adrien Richard. \newblock On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems. \newblock In {\em FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory}, volume 6914 of {\em LNCS}, pages 126--137, Oslo, Norway, August 2011. \bibitem[BCGS12]{bcgs12:ij} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel Salomon. \newblock Neural networks and chaos: Construction, evaluation of chaotic networks, and prediction of chaos with multilayer feedforward network. \newblock {\em Chaos, An Interdisciplinary Journal of Nonlinear Science}, 22(1):013122--1 -- 013122--9, March 2012. \newblock 9 pages. \bibitem[BCGW11]{bcgw11:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Qianxue Wang. \newblock Class of trustworthy pseudo random number generators. \newblock In {\em INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet}, pages 72--77, Luxembourg, Luxembourg, June 2011. \bibitem[BCVC10]{BCVC10:ir} J.~M. Bahi, S.~Contassot-Vivier, and J.-F. Couchot. \newblock Convergence results of combining synchronism and asynchronism for discrete-state discrete-time dynamic network. \newblock Research Report RR2010-02, LIFC - Laboratoire d’{I}nformatique de l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010. \bibitem[BDCC15]{BDCC16} Ahmad~W. Bitar, Rony Darazi, Jean-Fran{\c{c}}ois Couchot, and Rapha{\"e}l Couturier. \newblock Blind digital watermarking in pdf documents using spread transform dither modulation. \newblock {\em Multimedia Tools and Applications}, pages 1--19, 2015. \bibitem[CCFG16]{ccfg16:ip} Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra~Ahmed Fadil, and Christophe Guyeux. \newblock A second order derivatives based approach for steganography. \newblock In {\em Secrypt 2016, 13th Int. Conf. on Security and Cryptography}, pages 424--431, Lisbon, July 2016. \bibitem[CCG15]{ccg15:ij} Jean{-}Fran{\c{c}}ois Couchot, Rapha{\"{e}}l Couturier, and Christophe Guyeux. \newblock {STABYLO:} steganography with adaptive, bbs, and binary embedding at low cost. \newblock {\em Annales des T{\'{e}}l{\'{e}}communications}, 70(9-10):441--449, 2015. \bibitem[CCVHG16]{ccgh16} Jean-Fran\c{c}ois Couchot, Sylvain Contassot-Vivier, Pierre-Cyrille H\'eam, and Christophe Guyeux. \newblock Random walk in a n-cube without hamiltonian cycle to chaotic pseudorandom number generation: Theoretical and practical considerations. \newblock {\em International Journal of Bifurcation and Chaos}, 2016. \newblock Accepted on Oct 2016. \bibitem[CDS12]{cds12:ip} Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon. \newblock Suitability of artificial neural network for {MEMS}-based flow control. \newblock In Julien Bourgeois and Michel de~Labachelerie, editors, {\em dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS}, pages 1--6, Besan\c{c}on, France, April 2012. IEEE CPS. \bibitem[CDS13]{cds13:ij} Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon. \newblock Active {MEMS}-based flow control using artificial neural network. \newblock {\em Mechatronics}, 23(7):898--905, October 2013. \newblock Available online. \bibitem[CHG{\etalchar{+}}14a]{chgw+14:oip} Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue Wang, and Jacques Bahi. \newblock Pseudorandom number generators with balanced gray codes. \newblock In {\em Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, pages 469--475, Vienna, Austria, August 2014. \bibitem[CHG{\etalchar{+}}14b]{chgw+14:onp} Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue Wang, and Jacques Bahi. \newblock Traversing a n-cube without balanced hamiltonian cycle to generate pseudorandom numbers. \newblock 15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France, September 2014. \bibitem[Cou10]{Cou10:ir} J.-F. Couchot. \newblock Formal {C}onvergence {P}roof for {D}iscrete {D}ynamical {S}ystems. \newblock Research Report RR2010-03, LIFC - Laboratoire d’{I}nformatique de l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010. \bibitem[FCCG15]{fccg15:ip} Yousra~Ahmed Fadil, Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, and Christophe Guyeux. \newblock Steganalyzer performances in operational contexts. \newblock In {\em IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 429--432, Adelaide, Australia, September 2015. \bibitem[FGB11]{fgb11:ip} Nicolas Friot, Christophe Guyeux, and Jacques Bahi. \newblock Chaotic iterations for steganography - stego-security and chaos-security. \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, pages 218--227, Sevilla, Spain, July 2011. SciTePress. \bibitem[Guy10]{guyeuxphd} Christophe Guyeux. \newblock {\em Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique}. \newblock Th\`ese de {D}octorat, LIFC, Universit\'e de Franche-Comt\'e, 13 décembre 2010. \newblock Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté. \bibitem[Hol03]{Hol03} Gerard~J. Holzmann. \newblock {\em The SPIN Model Checker: Primer and Reference Manual}. \newblock Addison-Wesley, Pearson Education, 2003. \bibitem[KCM16]{kcm16:ip} N.~Khernane, J.-F. Couchot, and A.~Mostefaoui. \newblock Maximizing network lifetime in wireless video sensor networks under quality constraints. \newblock In {\em MOBIWAC 2016: The 14th ACM* International Symposium on Mobility Management and Wireless Access}, November 2016. \bibitem[ZS04]{ZanSup04} A.~J.~van Zanten and I.~N. Suparta. \newblock Totally balanced and exponentially balanced gray codes. \newblock {\em Discrete Analysis and Operational Research}, 11:81--98, 2004. \end{thebibliography}