Follow
Nicolas FRIOT
Nicolas FRIOT
Institut FEMTO-ST, CNRS, UMR 6174, Département d'Informatique des Systèmes Complexes
Verified email at femto-st.fr - Homepage
Title
Cited by
Cited by
Year
Chaotic iterations versus spread-spectrum: chaos and stego security
C Guyeux, N Friot, JM Bahi
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
392010
Chaotic iterations for steganography-stego-security and chaos-security
N Friot, C Guyeux, JM Bahi
Proceedings of the International Conference on Security and Cryptography …, 2011
132011
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure
JM Bahi, N Friot, C Guyeux
2012 Eighth International Conference on Intelligent Information Hiding and …, 2012
72012
A robust data hiding process contributing to the development of a semantic web
JM Bahi, JF Couchot, N Friot, C Guyeux
arXiv preprint arXiv:1706.08764, 2017
62017
Application of steganography for anonymity through the internet
JM Bahi, JF Couchot, N Friot, C Guyeux
arXiv preprint arXiv:1202.5302, 2012
32012
Quality studies of an invisible chaos-based watermarking scheme with message extraction
JM Bahi, JF Couchot, N Friot, C Guyeux, K Mazouzi
2013 Ninth International Conference on Intelligent Information Hiding and …, 2013
12013
Topological study and Lyapunov exponent of a secure steganographic scheme
JM Bahi, N Friot, C Guyeux
2013 International Conference on Security and Cryptography (SECRYPT), 1-9, 2013
12013
Itérations chaotiques pour la sécurité de l'information dissimulée
N Friot
Université de Franche-Comté, 2014
2014
Topological study and Lyapunov exponent of a secure steganographic scheme
N Friot, C Guyeux, JM Bahi
arXiv preprint arXiv:1206.2847, 2012
2012
A new secure process for steganography: CI2. Stego and topological security
N Friot, C Guyeux, J Bahi
A new secure process for steganography: CI2. Stego and topological security, 2012
2012
Chaotic iterations versus Spread-spectrum: topological-security and stego-security
C Guyeux, N Friot, JM Bahi
arXiv preprint arXiv:1112.3874, 2011
2011
Chaotic iterations for steganography: Stego-security and topological-security
N Friot, C Guyeux, JM Bahi
arXiv preprint arXiv:1112.3873, 2011
2011
CHAOTIC ITERATIONS FOR STEGANOGRAPHY
N Friot, C Guyeux, JM Bahi
2011
Procès-verbal du Conseil Scientifique de l’Université de Franche-Comté
A GONZALES, A DIDIERJEAN, S ORMAUX, S BÉAL, H RICHARD, ...
A new secure process for steganography: cr2
N Friot, C Guyeux, JM Bahi
The system can't perform the operation now. Try again later.
Articles 1–15