Zobrazeno 1 - 10
of 241
pro vyhledávání: '"Bahi, Jacques M."'
Autor:
Guyeux, Christophe, Bahi, Jacques M.
In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hi
Externí odkaz:
http://arxiv.org/abs/1708.05970
Internet communication systems involving cryptography and data hiding often require billions of random numbers. In addition to the speed of the algorithm, the quality of the pseudo-random number generator and the ease of its implementation are common
Externí odkaz:
http://arxiv.org/abs/1706.08773
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cry
Externí odkaz:
http://arxiv.org/abs/1706.08752
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding framework, and focus more specifically on robust steganography. Steganographic algorithms can participate
Externí odkaz:
http://arxiv.org/abs/1706.08764
Insertion Sequences (ISs) are small DNA segments that have the ability of moving themselves into genomes. These types of mobile genetic elements (MGEs) seem to play an essential role in genomes rearrangements and evolution of prokaryotic genomes, but
Externí odkaz:
http://arxiv.org/abs/1706.08267
Autor:
Couchot, Jean-François, Heam, Pierre-Cyrille, Guyeux, Christophe, Wang, Qianxue, Bahi, Jacques M.
This article presents a new class of Pseudorandom Number Generators. The generators are based on traversing a n-cube where a Balanced Hamiltonian Cycle has been removed. The construction of such generators is automatic for small number of bits, but r
Externí odkaz:
http://arxiv.org/abs/1706.08923
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompts a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks
Externí odkaz:
http://arxiv.org/abs/1706.08133
Autor:
Elghazel, Wiem, Bahi, Jacques M., Guyeux, Christophe, Hakem, Mourad, Medjaher, Kamal, Zerhouni, Noureddine
Maintenance is an important activity in industry. It is performed either to revive a machine/component or to prevent it from breaking down. Different strategies have evolved through time, bringing maintenance to its current state: condition-based and
Externí odkaz:
http://arxiv.org/abs/1706.08129
During evolution of microorganisms genomes underwork have different changes in their lengths, gene orders, and gene contents. Investigating these structural rearrangements helps to understand how genomes have been modified over time. Some elements th
Externí odkaz:
http://arxiv.org/abs/1706.08119
Variations in mitochondrial genes are usually considered to infer phylogenies. However some of these genes are lesser constraint than other ones, and thus may blur the phylogenetic signals shared by the majority of the mitochondrial DNA sequences. To
Externí odkaz:
http://arxiv.org/abs/1703.05099