Chaotic iterations versus spread-spectrum: chaos and stego security C Guyeux, N Friot, JM Bahi 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 39 | 2010 |
Chaotic iterations for steganography-stego-security and chaos-security N Friot, C Guyeux, JM Bahi Proceedings of the International Conference on Security and Cryptography …, 2011 | 13 | 2011 |
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure JM Bahi, N Friot, C Guyeux 2012 Eighth International Conference on Intelligent Information Hiding and …, 2012 | 7 | 2012 |
A robust data hiding process contributing to the development of a semantic web JM Bahi, JF Couchot, N Friot, C Guyeux arXiv preprint arXiv:1706.08764, 2017 | 6 | 2017 |
Application of Steganography for Anonymity through the Internet JM Bahi, JF Couchot, N Friot, C Guyeux arXiv preprint arXiv:1202.5302, 2012 | 3 | 2012 |
Quality studies of an invisible chaos-based watermarking scheme with message extraction JM Bahi, JF Couchot, N Friot, C Guyeux, K Mazouzi 2013 Ninth International Conference on Intelligent Information Hiding and …, 2013 | 1 | 2013 |
Topological study and Lyapunov exponent of a secure steganographic scheme JM Bahi, N Friot, C Guyeux 2013 International Conference on Security and Cryptography (SECRYPT), 1-9, 2013 | 1 | 2013 |
Itérations chaotiques pour la sécurité de l'information dissimulée N Friot Université de Franche-Comté, 2014 | | 2014 |
Topological study and Lyapunov exponent of a secure steganographic scheme N Friot, C Guyeux, JM Bahi arXiv preprint arXiv:1206.2847, 2012 | | 2012 |
A new secure process for steganography: CI2. Stego and topological security N Friot, C Guyeux, J Bahi A new secure process for steganography: CI2. Stego and topological security, 2012 | | 2012 |
Chaotic iterations versus Spread-spectrum: topological-security and stego-security C Guyeux, N Friot, JM Bahi arXiv preprint arXiv:1112.3874, 2011 | | 2011 |
Chaotic iterations for steganography: Stego-security and topological-security N Friot, C Guyeux, JM Bahi arXiv preprint arXiv:1112.3873, 2011 | | 2011 |
CHAOTIC ITERATIONS FOR STEGANOGRAPHY N Friot, C Guyeux, JM Bahi | | 2011 |
A more secure information hiding scheme than spread-spectrum obtained by chaos-security C Guyeux, JM Bahi, N Friot | | 2010 |
Procès-verbal du Conseil Scientifique de l’Université de Franche-Comté A GONZALES, A DIDIERJEAN, S ORMAUX, S BÉAL, H RICHARD, ... | | |
A new secure process for steganography: cr2 N Friot, C Guyeux, JM Bahi | | |