]. R. Références and . Bellman, Adaptive control processes : a guided tour, 1961.

C. Cachin, An Information-Theoretic Model for Steganography, Information Hiding : 2nd International Workshop, pp.306-318, 1998.
DOI : 10.1007/3-540-49380-8_21

D. François, High-dimensional data analysis : optimal metrics and feature selection, 2006.

J. Fridrich, Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, Information Hiding : 6th International Workshop, pp.67-81, 2004.
DOI : 10.1007/978-3-540-30114-1_6

S. Hetzl and P. Mutzel, A Graph???Theoretic Approach to Steganography, CMS 2005, pp.119-128, 2005.
DOI : 10.1007/11552055_12

G. Huang, Q. Zhu, and C. Siew, Extreme learning machine: Theory and applications, Neurocomputing, vol.70, issue.1-3, pp.1-3489, 2006.
DOI : 10.1016/j.neucom.2005.12.126

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3692

B. Efron and R. J. Tibshirani, An Introduction to the Bootstrap, Chapman et al, 1994.
DOI : 10.1007/978-1-4899-4541-9

Y. Kim, Z. Duric, and D. Richards, Modified Matrix Encoding Technique for Minimal Distortion Steganography, Information Hiding, pp.314-327, 2007.
DOI : 10.1007/978-3-540-74124-4_21

S. Lyu and H. Farid, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, 5th International Workshop on Information Hiding, 2002.
DOI : 10.1007/3-540-36415-3_22

D. Mccullagh, Secret Messages Come in .Wavs Online Newspaper : Wired News, p.12834186100, 2001.

Y. Miche, P. Bas, C. Jutten, O. Simula, and A. Lendasse, A methodology for building regression models using extreme learning machine : OP-ELM, ESANN 2008, European Symposium on Artificial Neural Networks, 2008.

Y. Miche, P. Bas, A. Lendasse, C. Jutten, and O. Simula, Extracting relevant features of steganographic schemes by feature selection techniques, Wacha'07 : Third Wavilla Challenge, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00166700

Y. Miche, B. Roue, P. Bas, and A. Lendasse, A Feature Selection Methodology for Steganalysis, MRCS06, International Workshop on Multi- 26
DOI : 10.1007/11848035_9

URL : https://hal.archives-ouvertes.fr/hal-00166578

T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
DOI : 10.1117/12.696774

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.37

N. Provos, Defending against statistical steganalysis, 10th USENIX Security Symposium, pp.323-335, 2001.

N. Provos and P. Honeyman, Detecting steganographic content on the internet, Network and Distributed System Security Symposium, 2002.

F. Rossi, A. Lendasse, D. François, V. Wertz, and M. Verleysen, Mutual information for the selection of relevant variables in spectrometric nonlinear modelling, Chemometrics and Intelligent Laboratory Systems, vol.80, issue.2, pp.215-226, 2006.
DOI : 10.1016/j.chemolab.2005.06.010

URL : https://hal.archives-ouvertes.fr/inria-00174077

P. Sallee, Model-Based Steganography, Digital Watermarking, pp.154-167, 2004.
DOI : 10.1007/978-3-540-24624-4_12

Y. Q. Shi, C. Chen, and W. Chen, A Markov Process Based Approach to Effective Attacking JPEG Steganography, ICME'06 : Internation Conference on Multimedia and Expo, pp.9-12
DOI : 10.1007/978-3-540-74124-4_17

A. Sorjamaa, Y. Miche, and A. Lendasse, Long-term prediction of time series using NNE-based projection and OP-ELM, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008.
DOI : 10.1109/IJCNN.2008.4634173

M. Verleysen and D. François, The Curse of Dimensionality in Data Mining and Time Series Prediction, IWANN'05 : 8th International Work- Conference on Artificial Neural Network, pp.758-770, 2005.
DOI : 10.1007/11494669_93

A. Westfeld, F5???A Steganographic Algorithm, Information Hiding : 4th International Workshop, pp.289-302, 2001.
DOI : 10.1007/3-540-45496-9_21

A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, IH '99 : Proceedings of the Third International Workshop on Information Hiding, pp.61-76, 2000.
DOI : 10.1007/10719724_5