Skip to main content

Showing 1–50 of 73 results for author: Guyeux, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1805.09261  [pdf, other

    cs.DS math.OC

    Online shortest paths with confidence intervals for routing in a time varying random network

    Authors: Stéphane Chrétien, Christophe Guyeux

    Abstract: The increase in the world's population and rising standards of living is leading to an ever-increasing number of vehicles on the roads, and with it ever-increasing difficulties in traffic management. This traffic management in transport networks can be clearly optimized by using information and communication technologies referred as Intelligent Transport Systems (ITS). This management problem is u… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

  2. arXiv:1804.01071  [pdf, other

    math.ST cs.LG stat.ML

    Average performance analysis of the stochastic gradient method for online PCA

    Authors: Stephane Chretien, Christophe Guyeux, Zhen-Wai Olivier HO

    Abstract: This paper studies the complexity of the stochastic gradient algorithm for PCA when the data are observed in a streaming setting. We also propose an online approach for selecting the learning rate. Simulation experiments confirm the practical relevance of the plain stochastic gradient approach and that drastic improvements can be achieved by learning the learning rate.

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: 11 pages, 1 figure, Submitted to LOD 2018

  3. arXiv:1708.05970  [pdf, other

    cs.MM cs.CR cs.IT

    An improved watermarking scheme for Internet applications

    Authors: Christophe Guyeux, Jacques M. Bahi

    Abstract: In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hidden channels, and social search engines. By using Reed Solomon error correcting codes and wavelets domain, we show that this data hiding scheme can b… ▽ More

    Submitted 20 August, 2017; originally announced August 2017.

    Comments: Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. pp. 119-124

  4. arXiv:1708.05965  [pdf, other

    cs.DC cs.CY

    On the topology effects in wireless sensor networks based prognostics and health management

    Authors: Ahmad Farhat, Abdallah Makhoul, Christophe Guyeux, Rami Tawil, Ali Jaber, Abbas Hijazi

    Abstract: In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from… ▽ More

    Submitted 20 August, 2017; originally announced August 2017.

    Comments: 19th IEEE International Conference on Computational Science and Engineering

  5. arXiv:1708.04963  [pdf, other

    cs.CR

    Introducing the truly chaotic finite state machines and their applications in security field

    Authors: Christophe Guyeux, Qianxue Wang, Xiole Fang, Jacques Bahi

    Abstract: The truly chaotic finite machines introduced by authors in previous research papers are presented here. A state of the art in this discipline, encompassing all previous mathematical investigations, is provided, explaining how finite state machines can behave chaotically regarding the slight alteration of their inputs. This behavior is explained using Turing machines and formalized thanks to a spec… ▽ More

    Submitted 25 June, 2017; originally announced August 2017.

  6. arXiv:1708.03243  [pdf, other

    nlin.CD cs.CR

    Summary of Topological Study of Chaotic CBC Mode of Operation

    Authors: Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallègue, Mohsen Machhout

    Abstract: In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryption systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to provide confidentiality or authenticity. In this research work, we intend to summarize our results that have been detailed in our previous series of articles. The goal of this… ▽ More

    Submitted 9 August, 2017; originally announced August 2017.

    Comments: arXiv admin note: text overlap with arXiv:1605.02950, arXiv:1608.05838, arXiv:1601.08139

  7. arXiv:1708.02793  [pdf, other

    nlin.CD cs.CR

    Diffusion and confusion of chaotic iteration based hash functions

    Authors: Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu

    Abstract: To guarantee the integrity and security of data transmitted through the Internet, hash functions are fundamental tools. But recent researches have shown that security flaws exist in the most widely used hash functions. So a new way to improve their security performance is urgently demanded. In this article, we propose new hash functions based on chaotic iterations, which have chaotic properties as… ▽ More

    Submitted 9 August, 2017; originally announced August 2017.

  8. arXiv:1706.08923  [pdf, other

    cs.DS

    Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers

    Authors: Jean-François Couchot, Pierre-Cyrille Heam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi

    Abstract: This article presents a new class of Pseudorandom Number Generators. The generators are based on traversing a n-cube where a Balanced Hamiltonian Cycle has been removed. The construction of such generators is automatic for small number of bits, but remains an open problem when this number becomes large. A running example is used throughout the paper. Finally, first statistical experiments of these… ▽ More

    Submitted 26 June, 2017; originally announced June 2017.

  9. arXiv:1706.08773  [pdf, other

    cs.CR nlin.CD

    An optimization technique on pseudorandom generators based on chaotic iterations

    Authors: Jacques M. Bahi, Xiaole Fang, Christophe Guyeux

    Abstract: Internet communication systems involving cryptography and data hiding often require billions of random numbers. In addition to the speed of the algorithm, the quality of the pseudo-random number generator and the ease of its implementation are common practical aspects. In this work we will discuss how to improve the quality of random numbers independently from their generation algorithm. We propos… ▽ More

    Submitted 27 June, 2017; originally announced June 2017.

  10. arXiv:1706.08764  [pdf, other

    cs.MM

    A Robust Data Hiding Process Contributing to the Development of a Semantic Web

    Authors: Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux

    Abstract: In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding framework, and focus more specifically on robust steganography. Steganographic algorithms can participate in the development of a semantic web: medias being on the Internet can be enriched by information related to their contents, authors, etc., leading t… ▽ More

    Submitted 27 June, 2017; originally announced June 2017.

  11. arXiv:1706.08752  [pdf, ps, other

    cs.CR

    A Cryptographic Approach for Steganography

    Authors: Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Heam

    Abstract: In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains. These preliminaries lead to a first proof of a cryptographically secure information hiding scheme.

    Submitted 27 June, 2017; originally announced June 2017.

  12. arXiv:1706.08514  [pdf, other

    q-bio.PE cs.AI q-bio.QM

    Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization

    Authors: Reem Alsrraj, Bassam AlKindy, Christophe Guyeux, Laurent Philippe, Jean-François Couchot

    Abstract: The number of complete chloroplastic genomes increases day after day, making it possible to rethink plants phylogeny at the biomolecular era. Given a set of close plants sharing in the order of one hundred of core chloroplastic genes, this article focuses on how to extract the largest subset of sequences in order to obtain the most supported species tree. Due to computational complexity, a discret… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1608.08749

  13. arXiv:1706.08136  [pdf, other

    cs.MM cs.SE

    On the usefulness of information hiding techniques for wireless sensor networks security

    Authors: Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul, Ali Jaber

    Abstract: A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this "sensory data image". Steganography refers to the technology of hiding data into digital media without drawing any susp… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  14. arXiv:1706.08133  [pdf, other

    cs.DC

    A Security Framework for Wireless Sensor Networks: Theory and Practice

    Authors: Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi

    Abstract: Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompts a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. In this work we emphasize two security issues: (1) secure com… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  15. arXiv:1706.08129  [pdf, other

    cs.SE

    Dependability of Sensor Networks for Industrial Prognostics and Health Management

    Authors: Wiem Elghazel, Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni

    Abstract: Maintenance is an important activity in industry. It is performed either to revive a machine/component or to prevent it from breaking down. Different strategies have evolved through time, bringing maintenance to its current state: condition-based and predictive maintenances. This evolution was due to the increasing demand of reliability in industry. The key process of condition-based and predictiv… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  16. arXiv:1706.08106  [pdf, other

    cs.AI

    Random Forests for Industrial Device Functioning Diagnostics Using Wireless Sensor Networks

    Authors: Wiem Elghazel, Kamal Medjaher, Nourredine Zerhouni, Jacques Bahi, Ahamd Farhat, Christophe Guyeux, Mourad Hakem

    Abstract: In this paper, random forests are proposed for operating devices diagnostics in the presence of a variable number of features. In various contexts, like large or difficult-to-access monitored areas, wired sensor networks providing features to achieve diagnostics are either very costly to use or totally impossible to spread out. Using a wireless sensor network can solve this problem, but this latte… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  17. arXiv:1706.08101  [pdf, other

    cs.CR

    Design and evaluation of chaotic iterations based keyed hash function

    Authors: Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang

    Abstract: Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security. As an extension of our previous research works, a new chaotic iterations keyed hash f… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  18. arXiv:1706.08099  [pdf, other

    cs.CR

    Lyapunov Exponent Evaluation of the CBC Mode of Operation

    Authors: Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallègue, Mohsen Machhout

    Abstract: The Cipher Block Chaining (CBC) mode of encryption was invented in 1976, and it is currently one of the most commonly used mode. In our previous research works, we have proven that the CBC mode of operation exhibits, under some conditions, a chaotic behavior. The dynamics of this mode has been deeply investigated later, both qualitatively and quantitatively, using the rigorous mathematical topolog… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  19. arXiv:1706.08093  [pdf, ps, other

    cs.CR cs.DC

    One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA

    Authors: Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux

    Abstract: Sub-categories of mathematical topology, like the mathematical theory of chaos, offer interesting applications devoted to information security. In this research work, we have introduced a new chaos-based pseudorandom number generator implemented in FPGA, which is mainly based on the deletion of a Hamilton cycle within the $n$-cube (or on the vectorial negation), plus one single permutation. By doi… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  20. arXiv:1706.08089  [pdf, other

    cs.AI q-bio.QM

    Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox

    Authors: Régis Garnier, Christophe Guyeux, Stéphane Chrétien

    Abstract: In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization proble… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  21. arXiv:1706.08088  [pdf, other

    cs.CV

    Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance

    Authors: Anthony Tannoury, Rony Darazi, Christophe Guyeux, Abdallah Makhoul

    Abstract: Wireless Multimedia Sensor Network (WMSN) is a promising technology capturing rich multimedia data like audio and video, which can be useful to monitor an environment under surveillance. However, many scenarios in real time monitoring requires 3D depth information. In this research work, we propose to use the disparity map that is computed from two or multiple images, in order to monitor the depth… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  22. Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations

    Authors: Sylvain Contassot-Vivier, Jean-François Couchot, Christophe Guyeux, Pierre-Cyrille Heam

    Abstract: Designing a pseudorandom number generator (PRNG) is a difficult and complex task. Many recent works have considered chaotic functions as the basis of built PRNGs: the quality of the output would indeed be an obvious consequence of some chaos properties. However, there is no direct reasoning that goes from chaotic functions to uniform distribution of the output. Moreover, embedding such kind of fun… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: Published in International Journal of Bifurcation and Chaos

  23. arXiv:1702.02516  [pdf, other

    cs.CR

    Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham

    Abstract: There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks of weak computation and battery power. In this… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: Published in IJDSN

  24. arXiv:1702.02489  [pdf, ps, other

    cs.CR

    Hash functions using chaotic iterations

    Authors: Jacques M. Bahi, Christophe Guyeux

    Abstract: In this paper, a novel formulation of discrete chaotic iterations in the field of dynamical systems is given. Their topological properties are studied: it is mathematically proved that, under some conditions, these iterations have a chaotic behavior in the meaning of Devaney. This chaotic behavior allows us to propose a way to generate new hash functions. An illustration example is detailed in ord… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: Published in Journal of Algorithms and Computational Technology. arXiv admin note: substantial text overlap with arXiv:1511.00117, arXiv:0810.4711, arXiv:1608.05920, arXiv:0810.4702, arXiv:0810.3154

  25. arXiv:1611.08422  [pdf, ps, other

    nlin.CD cs.CR

    Randomness and disorder of chaotic iterations. Applications in information security field

    Authors: Xiaole Fang, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi

    Abstract: Design and cryptanalysis of chaotic encryption schemes are major concerns to provide secured information systems. Pursuing our previous research works, some well-defined discrete chaotic iterations that satisfy the reputed Devaney's definition of chaos have been proposed. In this article, we summarize these contributions and propose applications in the fields of pseudorandom number generation, has… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to Nolta 2015

  26. arXiv:1611.08417  [pdf, other

    cs.CR

    On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets

    Authors: Sara Barakat, Bechara Al Bouna, Mohamed Nassar, Christophe Guyeux

    Abstract: Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred to… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to Secrypt 2016

  27. arXiv:1611.08410  [pdf, other

    cs.CR

    FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study

    Authors: Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux

    Abstract: Pseudorandom number generation (PRNG) is a key element in hardware security platforms like field-programmable gate array FPGA circuits. In this article, 18 PRNGs belonging in 4 families (xorshift, LFSR, TGFSR, and LCG) are physically implemented in a FPGA and compared in terms of area, throughput, and statistical tests. Two flows of conception are used for Register Transfer Level (RTL) and High-le… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to Secrypt16

  28. arXiv:1611.08401  [pdf, other

    cs.DC cs.IT

    Investigating Low Level Protocols for Wireless Body Sensor Networks

    Authors: Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul

    Abstract: The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper inve… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to AICCSA 2016

  29. arXiv:1611.08397  [pdf, ps, other

    cs.MM

    A Second Order Derivatives based Approach for Steganography

    Authors: Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux

    Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, nois… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to SECRYPT 2016

  30. arXiv:1608.08749  [pdf, other

    cs.AI q-bio.GN

    Binary Particle Swarm Optimization versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees

    Authors: Bassam AlKindy, Bashar Al-Nuaimi, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Reem Alsrraj, Laurent Philippe

    Abstract: The amount of completely sequenced chloroplast genomes increases rapidly every day, leading to the possibility to build large-scale phylogenetic trees of plant species. Considering a subset of close plant species defined according to their chloroplasts, the phylogenetic tree that can be inferred by their core genes is not necessarily well supported, due to the possible occurrence of problematic ge… ▽ More

    Submitted 31 August, 2016; originally announced August 2016.

    Journal ref: Lecture Notes in Bioinformatics LNBI series, 9874, 165--179, 2016

  31. arXiv:1608.07443  [pdf, other

    cs.DC cs.SI

    Using an epidemiological approach to maximize data survival in the internet of things

    Authors: Abdallah Makhoul, Christophe Guyeux, Mourad Hakem, Jacques M. Bahi

    Abstract: The internet of things (IoT) has gained worldwide attention in recent years. It transforms the everyday objects that surround us into proactive actors of the Internet, generating and consuming information. An important issue related to the appearance of such large-scale self-coordinating IoT is the reliability and the collaboration between the objects in the presence of environmental hazards. High… ▽ More

    Submitted 26 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1608.05951

    Journal ref: ACM Transactions on Internet Technology. 16 (1), 2015

  32. arXiv:1608.05951  [pdf, other

    cs.DC cs.NI

    Epidemiological Approach for Data Survivability in Unattended Wireless Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Abdallah Makhoul

    Abstract: Unattended Wireless Sensor Networks (UWSNs) are Wireless Sensor Networks characterized by sporadic sink presence and operation in hostile settings. The absence of the sink for period of time, prevents sensor nodes to offload data in real time and offer greatly increased opportunities for attacks resulting in erasure, modification, or disclosure of sensor-collected data. In this paper, we focus on… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

  33. arXiv:1608.05945  [pdf, other

    nlin.CD cs.CR math.DS nlin.PS

    Theoretical design and circuit implementation of integer domain chaotic systems

    Authors: Qianxue Wang, Simin Yu, Christophe Guyeux, Jacques Bahi, Xiaole Fang

    Abstract: In this paper, a new approach for constructing integer domain chaotic systems (IDCS) is proposed, and its chaotic behavior is mathematically proven according to the Devaney's definition of chaos. Furthermore, an analog-digital hybrid circuit is also developed for realizing the designed basic IDCS. In the IDCS circuit design, chaos generation strategy is realized through a sample-hold circuit and a… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Journal ref: International Journal of Bifurcation and Chaos. 24(10), 1450128, 2014

  34. arXiv:1608.05936  [pdf, other

    cs.DC cs.CR

    Two Security Layers for Hierarchical Data Aggregation in Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul

    Abstract: Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission among sensor networks. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks. Hence, an end-to… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Journal ref: International Journal of Autonomous and Adaptive Communications Systems. 7(3), 239-270, 2014

  35. arXiv:1608.05930  [pdf, other

    cs.CR cs.AR math.DS nlin.CD

    FPGA Design for Pseudorandom Number Generator Based on Chaotic Iteration used in Information Hiding Application

    Authors: Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Laurent Larger

    Abstract: Lots of researches indicate that the inefficient generation of random numbers is a significant bottleneck for information communication applications. Therefore, Field Programmable Gate Array (FPGA) is developed to process a scalable fixed-point method for random streams generation. In our previous researches, we have proposed a technique by applying some well-defined discrete chaotic iterations th… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1012.4620, arXiv:1112.1201

    Journal ref: Applied Mathematics & Information Sciences. Vol. 7(6), pp. 2175-2188 (2013)

  36. arXiv:1608.05928  [pdf, other

    cs.CR

    Quality Analysis of a Chaotic Proven Keyed Hash Function

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

    Abstract: Hash functions are cryptographic tools, which are notably involved in integrity checking and password storage. They are of primary importance to improve the security of exchanges through the Internet. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital data must be investigated. In this document an original keyed hash function i… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1112.1271

    Journal ref: International Journal On Advances in Internet Technology. 5(1), pp.26-33, 2012

  37. arXiv:1608.05920  [pdf, other

    nlin.CD cs.CR math.DS

    A Topological Study of Chaotic Iterations. Application to Hash Functions

    Authors: Christophe Guyeux, Jacques M. Bahi

    Abstract: Chaotic iterations, a tool formerly used in distributed computing, has recently revealed various interesting properties of disorder leading to its use in the computer science security field. In this paper, a comprehensive study of its topological behavior is proposed. It is stated that, in addition to being chaotic as defined in the Devaney's formulation, this tool possesses the property of topolo… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1511.00117

    Journal ref: Studies in Computational Intelligence, pp. 51-73 (2012)

  38. arXiv:1608.05916  [pdf, other

    cs.NE math.DS nlin.CD

    Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Michel Salomon

    Abstract: Many research works deal with chaotic neural networks for various fields of application. Unfortunately, up to now these networks are usually claimed to be chaotic without any mathematical proof. The purpose of this paper is to establish, based on a rigorous theoretical framework, an equivalence between chaotic iterations according to Devaney and a particular class of neural networks. On the one ha… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Journal ref: AIP Chaos, An Interdisciplinary Journal of Nonlinear Science. 22(1), 013122 (2012)

  39. arXiv:1608.05850  [pdf, other

    cs.MM cs.CR

    Steganalyzer performances in operational contexts

    Authors: Yousra A. Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux

    Abstract: Steganography and steganalysis are two important branches of the information hiding field of research. Steganography methods consist in hiding information in such a way that the secret message is undetectable for the uninitiated. Steganalyzis encompasses all the techniques that attempt to detect the presence of such hidden information. This latter is usually designed by making classifiers able to… ▽ More

    Submitted 20 August, 2016; originally announced August 2016.

    Comments: Proceedings of IIH-MSP 2015, The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing

  40. arXiv:1608.05844  [pdf, other

    cs.DC

    Resiliency in Distributed Sensor Networks for PHM of the Monitoring Targets

    Authors: Jacques Bahi, Wiem Elghazel, Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Kamal Medjaher, Nourredine Zerhouni

    Abstract: In condition-based maintenance, real-time observations are crucial for on-line health assessment. When the monitoring system is a wireless sensor network, data loss becomes highly probable and this affects the quality of the remaining useful life prediction. In this paper, we present a fully distributed algorithm that ensures fault tolerance and recovers data loss in wireless sensor networks. We f… ▽ More

    Submitted 20 August, 2016; originally announced August 2016.

    Comments: The Computer Journal (accepted)

  41. Proving chaotic behaviour of CBC mode of operation

    Authors: Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux

    Abstract: The cipher block chaining (CBC) block cipher mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting which is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behaviour according to Devaney. Some cases will be properly studied in… ▽ More

    Submitted 20 August, 2016; originally announced August 2016.

    Comments: International Journal of Bifurcation and Chaos, accepted paper. arXiv admin note: substantial text overlap with arXiv:1601.08139, arXiv:1605.02950

  42. arXiv:1605.07946  [pdf, other

    cs.MM

    Steganalysis via a Convolutional Neural Network using Large Convolution Filters for Embedding Process with Same Stego Key

    Authors: Jean-François Couchot, Raphaël Couturier, Christophe Guyeux, Michel Salomon

    Abstract: For the past few years, in the race between image steganography and steganalysis, deep learning has emerged as a very promising alternative to steganalyzer approaches based on rich image models combined with ensemble classifiers. A key knowledge of image steganalyzer, which combines relevant image features and innovative classification procedures, can be deduced by a deep learning approach called… ▽ More

    Submitted 30 July, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

  43. arXiv:1605.02950  [pdf, other

    cs.CR

    The dynamics of the CBC Mode of Operation

    Authors: Abdessalem Abidi, Christophe Guyeux, Bechara Al Bouna, Belgacem Bouallègue, Mohsen Machhout

    Abstract: In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity. In our previous research work, we have shown that this mode of operation exhibits, under some conditions, a chaotic behaviour. We have studied this behaviour by evaluating both its level of sensibility and… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Nonlinearity, IOP Publishing, 2016. arXiv admin note: text overlap with arXiv:1601.08139

  44. arXiv:1511.00118  [pdf, ps, other

    cs.MM

    A new chaos-based watermarking algorithm

    Authors: Jacques M. Bahi, Christophe Guyeux

    Abstract: This paper introduces a new watermarking algorithm based on discrete chaotic iterations. After defining some coefficients deduced from the description of the carrier medium, chaotic discrete iterations are used to mix the watermark and to embed it in the carrier medium. It can be proved that this procedure generates topological chaos, which ensures that desired properties of a watermarking algorit… ▽ More

    Submitted 31 October, 2015; originally announced November 2015.

    Comments: SECRYPT 2010, International Conference on Security and Cryptograph. Submitted as a regular paper, accepted as a short one. arXiv admin note: text overlap with arXiv:0810.4713, arXiv:1012.4620

  45. Topological chaos and chaotic iterations. Application to Hash functions

    Authors: Christophe Guyeux, Jacques M. Bahi

    Abstract: This paper introduces a new notion of chaotic algorithms. These algorithms are iterative and are based on so-called chaotic iterations. Contrary to all existing studies on chaotic iterations, we are not interested in stable states of such iterations but in their possible unpredictable behaviors. By establishing a link between chaotic iterations and the notion of Devaney's topological chaos, we giv… ▽ More

    Submitted 31 October, 2015; originally announced November 2015.

    Comments: IJCNN 2010, Int. Joint Conf. on Neural Networks, joint to WCCI'10, IEEE World Congress on Computational Intelligence

  46. Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species

    Authors: Bassam AlKindy, Huda Al-Nayyef, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi

    Abstract: The way to infer well-supported phylogenetic trees that precisely reflect the evolutionary process is a challenging task that completely depends on the way the related core genes have been found. In previous computational biology studies, many similarity based algorithms, mainly dependent on calculating sequence alignment matrices, have been proposed to find them. In these kinds of approaches, a s… ▽ More

    Submitted 23 April, 2015; originally announced April 2015.

    Comments: 12 pages, 7 figures, IWBBIO 2015 (3rd International Work-Conference on Bioinformatics and Biomedical Engineering)

    Journal ref: Springer LNBI 9043, 2015, 379--390

  47. arXiv:1504.05095  [pdf, other

    cs.AI cs.NE q-bio.PE q-bio.QM

    Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes

    Authors: Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Christian Parisod, Jacques M. Bahi

    Abstract: The amount of completely sequenced chloroplast genomes increases rapidly every day, leading to the possibility to build large scale phylogenetic trees of plant species. Considering a subset of close plant species defined according to their chloroplasts, the phylogenetic tree that can be inferred by their core genes is not necessarily well supported, due to the possible occurrence of "problematic"… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: 15 pages, 7 figures, 2nd International Conference on Algorithms for Computational Biology, AlCoB 2015

  48. Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts

    Authors: Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi

    Abstract: In computational biology and bioinformatics, the manner to understand evolution processes within various related organisms paid a lot of attention these last decades. However, accurate methodologies are still needed to discover genes content evolution. In a previous work, two novel approaches based on sequence similarities and genes features have been proposed. More precisely, we proposed to use g… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Comments: 4 pages, IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2014)

  49. arXiv:1409.6369  [pdf, other

    cs.CE q-bio.PE

    Finding the Core-Genes of Chloroplasts

    Authors: Bassam AlKindy, Jean-François Couchot, Christophe Guyeux, Arnaud Mouly, Michel Salomon, Jacques M. Bahi

    Abstract: Due to the recent evolution of sequencing techniques, the number of available genomes is rising steadily, leading to the possibility to make large scale genomic comparison between sets of close species. An interesting question to answer is: what is the common functionality genes of a collection of species, or conversely, to determine what is specific to a given species when compared to other ones… ▽ More

    Submitted 22 September, 2014; originally announced September 2014.

    Journal ref: Journal of Bioscience, Biochemistry, and Bioinformatics, 4(5):357--364, 2014

  50. arXiv:1212.3648  [pdf, other

    cs.CR

    The Metadata Anonymization Toolkit

    Authors: Julien Voisin, Christophe Guyeux, Jacques M. Bahi

    Abstract: This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right ba… ▽ More

    Submitted 26 May, 2013; v1 submitted 14 December, 2012; originally announced December 2012.

    Comments: 7 pages, one figure