-\chapter{Fonctions dont les graphes
- $\textsc{giu}(f)$
- $\textsc{gig}(f)$
- sont fortement connexes}
-% Secrypt 14
-% TSI 2015
-
-\chapter{Quantifier l'écart par rapport à la distribution uniforme}
-%15 Rairo
-
-
-
-\part{Conclusion et Perspectives}
-
-\JFC{Perspectives pour SDD->Promela}
-Among drawbacks of the method, one can argue that bounded delays is only
-realistic in practice for close systems.
-However, in real large scale distributed systems where bandwidth is weak,
-this restriction is too strong. In that case, one should only consider that
-matrix $s^{t}$ follows the iterations of the system, \textit{i.e.},
-for all $i$, $j$, $1 \le i \le j \le n$, we have$
-\lim\limits_{t \to \infty} s_{ij}^t = + \infty$.
-One challenge of this work should consist in weakening this constraint.
-We plan as future work to take into account other automatic approaches
-to discharge proofs notably by deductive analysis~\cite{CGK05}.
-
-\JFC{Perspective ANN}
-
-In future work we intend to enlarge the comparison between the
-learning of truly chaotic and non-chaotic behaviors. Other
-computational intelligence tools such as support vector machines will
-be investigated too, to discover which tools are the most relevant
-when facing a truly chaotic phenomenon. A comparison between learning
-rate success and prediction quality will be realized. Concrete
-consequences in biology, physics, and computer science security fields
-will then be stated.
-Ajouter lefait que le codede gray n'est pas optimal.
-On pourrait aussi travailler à établir un classement qui préserverait
-le fait que deux configurations voisines seraient représentées
-par deux entiers voisins.
-
+\chapter{Les générateurs issus des codes de Gray}\label{chap:PRNG:gray}
+\input{14Secrypt}
+
+
+
+\part{Application au masquage d'information}
+
+
+\chapter{Des embarquements préservant le chaos}\label {chap:watermarking}
+\input{oxford}
+
+\chapter{Une démarche de marquage de PDF}\label{chap:watermarking:pdf}
+\input{ahmad}
+
+\chapter[STABYLO] {Une démarche plus classique de dissimulation: STABYLO}\label{chap:stabylo}
+ \input{stabylo}
+
+\chapter[Stéganographie par dérivées secondes]{Schémas de stéganographie: les dérivées secondes}\label{chap:th:yousra}
+ \input{stegoyousra}
+
+
+
+\part*{Conclusion et Perspectives}
+
+\input{conclusion}
+
+