1 \section{Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction~\cite{bcfg+13:ip}}
3 In this article published in IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing,
4 the steganographic scheme formerly denoted by SCISMM and published in Secrypt 11~\cite{fgb11:ip}
5 (see Section~\ref{sec:secrypt11}) is evaluated regarding its robustness.
6 Following the new name provided in~\cite{bcfg+13:ip}, we will now call it $\mathcal{CI}$
7 to be coherent with the article we summarize here.
9 \subsection{Practical considerations regarding the $\mathcal{CI}$ steganographic scheme}
\r
10 \label{section:process-ci2}
\r
13 To study the robustness of the $\mathcal{CI}$ algorithm necessitates first
14 to discuss about the practical issues of its implementation. We have
15 firstly emphasizes that the following requirements have to be
16 satisfied~\cite{bcfg+13:ip}:
18 \item The number $l$ of iterations is sufficiently large (see details
20 \item \label{itm2:Sc} Let $\Im(S_p)$ be the set
21 $ \{S^1_p, S^2_p, \ldots, S^l_p\}$ of cardinality $k$, $k \leq l$ (repetitions are removed in a
23 This set contains all the elements of $x$ that have been modified
24 along the iteration process.
25 Let us consider $\Im(S_c)_{|D}$ defined by
26 $\{S^{d_1}_c, S^{d_2}_c, \ldots, S^{d_k}_c\}$
28 $d_i$ is the last iteration that has modified the element $i \in \Im(S_p)$.
29 We require that this set is equal
30 to $\llbracket 0 ;\mathsf{P} -1 \rrbracket$.