\newcommand{\etalchar}[1]{$^{#1}$}
\begin{thebibliography}{CCVHG16}
+\bibitem[AAG{\etalchar{+}}15]{aagc+15:ip}
+Bassam AlKindy, Bashar Al{-}Nuaimi, Christophe Guyeux, Jean{-}Fran{\c{c}}ois
+ Couchot, Michel Salomon, Reem Alsrraj, and Laurent Philippe.
+\newblock Binary particle swarm optimization versus hybrid genetic algorithm
+ for inferring well supported phylogenetic trees.
+\newblock In Claudia Angelini, Paola M.~V. Rancoita, and Stefano Rovetta,
+ editors, {\em Computational Intelligence Methods for Bioinformatics and
+ Biostatistics - 12th International Meeting, {CIBB} 2015, Naples, Italy,
+ September 10-12, 2015, Revised Selected Papers}, volume 9874 of {\em Lecture
+ Notes in Computer Science}, pages 165--179. Springer, 2015.
+
\bibitem[ABCVS05]{abcvs05}
A.~Abbas, J.~M. Bahi, S.~Contassot-Vivier, and M.~Salomon.
\newblock Mixing synchronism / asynchronism in discrete-state discrete-time
Algorithms, DCDIS'2005}, pages 524--529, Guelph, Canada, July 2005.
\newblock ISSN 1492-8760.
-\bibitem[BCG12]{bcg11:ij}
+\bibitem[ACGS13]{acgs13:onp}
+Bassam Alkindy, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel
+ Salomon.
+\newblock Finding the core-genes of chloroplast species.
+\newblock Journ\'ees SeqBio 2013, Montpellier, November 2013.
+
+\bibitem[BCC{\etalchar{+}}15]{accfg15:ip}
+B.~Al Bouna, J.~F. Couchot, R.~Couturier, Y.~A. Fadil, and C.~Guyeux.
+\newblock Performance study of steganalysis techniques.
+\newblock In {\em Applied Research in Computer Science and Engineering (ICAR),
+ 2015 International Conference on}, pages 1--7, Lebanon, October 2015.
+
+\bibitem[BCF{\etalchar{+}}13]{bcfg+13:ip}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, Christophe Guyeux, and
+ Kamel Mazouzi.
+\newblock Quality studies of an invisible chaos-based watermarking scheme with
+ message extraction.
+\newblock In {\em IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding
+ and Multimedia Signal Processing}, pages 547--550, Beijing, China, October
+ 2013.
+
+\bibitem[BCFG12a]{bcfg12a:ip}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
+\newblock Application of steganography for anonymity through the internet.
+\newblock In {\em IHTIAP'2012, 1-st Workshop on Information Hiding Techniques
+ for Internet Anonymity and Privacy}, pages 96--101, Venice, Italy, June 2012.
+
+\bibitem[BCFG12b]{bcfg12b:ip}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
+\newblock A robust data hiding process contributing to the development of a
+ semantic web.
+\newblock In {\em INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, pages
+ 71--76, Venice, Italy, June 2012.
+
+\bibitem[BCG11a]{bcg11:ip}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
+\newblock Performance analysis of a keyed hash function based on discrete and
+ chaotic proven iterations.
+\newblock In {\em INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+ pages 52--57, Luxembourg, Luxembourg, June 2011.
+\newblock Best paper award.
+
+\bibitem[BCG11b]{bcg11b:ip}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
+\newblock Steganography: a class of algorithms having secure properties.
+\newblock In {\em IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information
+ Hiding and Multimedia Signal Processing}, pages 109--112, Dalian, China,
+ October 2011.
+
+\bibitem[BCG12a]{bcg12:ij}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
+\newblock Quality analysis of a chaotic proven keyed hash function.
+\newblock {\em International Journal On Advances in Internet Technology},
+ 5(1):26--33, 2012.
+
+\bibitem[BCG12b]{bcg11:ij}
Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
\newblock Steganography: a class of secure and robust algorithms.
\newblock {\em The Computer Journal}, 55(6):653--666, 2012.
+\bibitem[BCG16]{DBLP:conf/secrypt/MohammedCG16}
+Mohammed Bakiri, Jean{-}Fran{\c{c}}ois Couchot, and Christophe Guyeux.
+\newblock {FPGA} implementation of f2-linear pseudorandom number generators
+ based on zynq mpsoc: {A} chaotic iterations post processing case study.
+\newblock In Christian Callegari, Marten van Sinderen, Panagiotis~G.
+ Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, and
+ Mohammad~S. Obaidat, editors, {\em Proceedings of the 13th International
+ Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume
+ 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.}, pages 302--309. SciTePress,
+ 2016.
+
\bibitem[BCGR11]{bcgr11:ip}
Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Adrien Richard.
\newblock On the link between strongly connected iteration graphs and chaotic
Theory}, volume 6914 of {\em LNCS}, pages 126--137, Oslo, Norway, August
2011.
+\bibitem[BCGS12]{bcgs12:ij}
+Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Michel Salomon.
+\newblock Neural networks and chaos: Construction, evaluation of chaotic
+ networks, and prediction of chaos with multilayer feedforward network.
+\newblock {\em Chaos, An Interdisciplinary Journal of Nonlinear Science},
+ 22(1):013122--1 -- 013122--9, March 2012.
+\newblock 9 pages.
+
\bibitem[BCGW11]{bcgw11:ip}
Jacques Bahi, Jean-Fran\c{c}ois Couchot, Christophe Guyeux, and Qianxue Wang.
\newblock Class of trustworthy pseudo random number generators.
\newblock Research Report RR2010-02, LIFC - Laboratoire d’{I}nformatique de
l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010.
+\bibitem[BDCC15]{BDCC16}
+Ahmad~W. Bitar, Rony Darazi, Jean-Fran{\c{c}}ois Couchot, and Rapha{\"e}l
+ Couturier.
+\newblock Blind digital watermarking in pdf documents using spread transform
+ dither modulation.
+\newblock {\em Multimedia Tools and Applications}, pages 1--19, 2015.
+
+\bibitem[CCFG16]{ccfg16:ip}
+Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, Yousra~Ahmed Fadil, and
+ Christophe Guyeux.
+\newblock A second order derivatives based approach for steganography.
+\newblock In {\em Secrypt 2016, 13th Int. Conf. on Security and Cryptography},
+ pages 424--431, Lisbon, July 2016.
+
+\bibitem[CCG15]{ccg15:ij}
+Jean{-}Fran{\c{c}}ois Couchot, Rapha{\"{e}}l Couturier, and Christophe Guyeux.
+\newblock {STABYLO:} steganography with adaptive, bbs, and binary embedding at
+ low cost.
+\newblock {\em Annales des T{\'{e}}l{\'{e}}communications}, 70(9-10):441--449,
+ 2015.
+
\bibitem[CCVHG16]{ccgh16}
Jean-Fran\c{c}ois Couchot, Sylvain Contassot-Vivier, Pierre-Cyrille H\'eam, and
Christophe Guyeux.
\newblock {\em International Journal of Bifurcation and Chaos}, 2016.
\newblock Accepted on Oct 2016.
-\bibitem[CHG{\etalchar{+}}14]{chgw+14:oip}
+\bibitem[CDS12]{cds12:ip}
+Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon.
+\newblock Suitability of artificial neural network for {MEMS}-based flow
+ control.
+\newblock In Julien Bourgeois and Michel de~Labachelerie, editors, {\em dMEMS
+ 2012, Workshop on design, control and software implementation for distributed
+ MEMS}, pages 1--6, Besan\c{c}on, France, April 2012. IEEE CPS.
+
+\bibitem[CDS13]{cds13:ij}
+Jean-Fran\c{c}ois Couchot, Karine Deschinkel, and Michel Salomon.
+\newblock Active {MEMS}-based flow control using artificial neural network.
+\newblock {\em Mechatronics}, 23(7):898--905, October 2013.
+\newblock Available online.
+
+\bibitem[CHG{\etalchar{+}}14a]{chgw+14:oip}
Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue
Wang, and Jacques Bahi.
\newblock Pseudorandom number generators with balanced gray codes.
\newblock In {\em Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
pages 469--475, Vienna, Austria, August 2014.
+\bibitem[CHG{\etalchar{+}}14b]{chgw+14:onp}
+Jean-Fran\c{c}ois Couchot, Pierre-Cyrille H\'eam, Christophe Guyeux, Qianxue
+ Wang, and Jacques Bahi.
+\newblock Traversing a n-cube without balanced hamiltonian cycle to generate
+ pseudorandom numbers.
+\newblock 15-th Mons Theoretical Computer Science Days (15e Journ\'ees
+ Montoises d'Informatique Th\'eorique), Nancy, France, September 2014.
+
\bibitem[Cou10]{Cou10:ir}
J.-F. Couchot.
\newblock Formal {C}onvergence {P}roof for {D}iscrete {D}ynamical {S}ystems.
\newblock Research Report RR2010-03, LIFC - Laboratoire d’{I}nformatique de
l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}, May 2010.
+\bibitem[FCCG15]{fccg15:ip}
+Yousra~Ahmed Fadil, Jean-Fran\c{c}ois Couchot, Rapha\"el Couturier, and
+ Christophe Guyeux.
+\newblock Steganalyzer performances in operational contexts.
+\newblock In {\em IIH-MSP 2015, 11th Int. Conf. on Intelligent Information
+ Hiding and Multimedia Signal Processing}, pages 429--432, Adelaide,
+ Australia, September 2015.
+
+\bibitem[FGB11]{fgb11:ip}
+Nicolas Friot, Christophe Guyeux, and Jacques Bahi.
+\newblock Chaotic iterations for steganography - stego-security and
+ chaos-security.
+\newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2011,
+ Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The
+ International Joint Conference on e-Business and Telecommunications}, pages
+ 218--227, Sevilla, Spain, July 2011. SciTePress.
+
\bibitem[Guy10]{guyeuxphd}
Christophe Guyeux.
\newblock {\em Le désordre des it\'erations chaotiques et leur utilit\'e en
\newblock {\em The SPIN Model Checker: Primer and Reference Manual}.
\newblock Addison-Wesley, Pearson Education, 2003.
+\bibitem[KCM16]{kcm16:ip}
+N.~Khernane, J.-F. Couchot, and A.~Mostefaoui.
+\newblock Maximizing network lifetime in wireless video sensor networks under
+ quality constraints.
+\newblock In {\em MOBIWAC 2016: The 14th ACM* International Symposium on
+ Mobility Management and Wireless Access}, November 2016.
+
\bibitem[ZS04]{ZanSup04}
A.~J.~van Zanten and I.~N. Suparta.
\newblock Totally balanced and exponentially balanced gray codes.