4 \section{The $\mathcal{CIS}_2$ Chaotic Iteration based Steganographic Process}
9 After the introduction of $\mathcal{CIW}_1$ in~\cite{gfb10:ip}, there were only two information hiding
10 schemes being both stego-secure and topologically secure.
11 The first one is based on a spread spectrum technique called Natural Watermarking.
12 It is stego-secure when its parameter $\eta$ is equal to $1$ \cite{Cayre2008}.
13 Unfortunately, this scheme is neither robust, nor able to face an attacker
14 in KOA and KMA setups, due to its lack of expansiveness~\cite{GuyeuxThese10}.
15 The second scheme both topologically secure and stego-secure has
16 been presented in the previous section.
17 However, this $\mathcal{CIW}_1$ process allows to embed securely only one bit per embedding parameters.
18 The objective of~\cite{fgb11:ip} was to improve the scheme
19 studied in~\cite{gfb10:ip}, in such a way that more than one bit can be embedded.
20 Such a study led to the definition of the $\mathcal{CIS}_2$ scheme presented here.
25 \subsection{The improved algorithm}
26 \label{section:Algorithm}
28 \label{section:IH based on CIs}
29 \label{sec:topological}
31 Let us firstly recall the notations and terminologies introduced
34 \begin{Def}%[Strategy adapter]
35 \label{def:strategy-adapter}
36 Let $\mathsf{k} \in \mathds{N}^\ast$.
37 A \emph{strategy adapter} is a sequence which elements belong into $\llbracket 0, \mathsf{k-1} \rrbracket$.
38 The set of all strategies with terms in $\llbracket 0, \mathsf{k-1} \rrbracket$
39 is denoted by $\mathbb{S}_\mathsf{k}$.
44 Intuitively, a strategy-adapter aims at generating a strategy
45 $(S^t)^{t \in \mathds{N}}$ where each term $S^t$ belongs to
46 $\llbracket 1, n \rrbracket$.
50 \begin{Def}%[Initial function]
51 Let $k \in \mathds{N}^\ast$.
52 The \emph{initial function} is the map $i_k$ defined by:
55 i_k: & \mathbb{S}_k & \longrightarrow & \llbracket 0, \mathsf{k-1} \rrbracket \\
56 & (S^{n})_{n\in \mathds{N}} & \longmapsto & S^{0} \\
63 Let $k \in \mathds{N}^\ast$.
64 The \emph{shift function} is the map $\sigma_k$ defined by:
67 \sigma_k : & \mathbb{S}_k & \longrightarrow & \mathbb{S}_k\\
68 & (S^{n})_{n\in \mathds{N}} & \longmapsto & (S^{n+1})_{n\in \mathds{N}}
73 Let us additionally recall the following notations.
75 \item $x^0 \in \mathbb{B}^\mathsf{N}$ the $\mathsf{N}$ least
76 significant coefficients of a given cover media $C$.% $X$ be the initial state $X_0$,
77 \item $m^0 \in \mathbb{B}^\mathsf{P}$ is the watermark to embed into $x^0$.
78 \item $S_1 \in \mathbb{S}_N$ is a strategy called \textbf{place strategy}, giving the location (LCS) where to insert the message at each iteration.
79 \item $S_2 \in \mathbb{S}_P$ is a strategy called \textbf{choice strategy}, providing which bits from the message must be inserted at the given iteration.
80 \item Lastly, $S_3 \in \mathbb{S}_P$ is a strategy called \textbf{mixing strategy}, as it is required for chaos to mix the message at each
87 The information hiding scheme published in~\cite{fgb11:ip} was
88 formerly called Steganography by Chaotic Iterations and
89 Substitution with Mixing Message (SCISMM in short),
90 and has been renamed $\mathcal{CIS}_2$ in later
91 publications. It is defined by
93 \mathds{N}^{\ast} \times \llbracket 0;\mathsf{N-1}\rrbracket \times \llbracket
94 0;\mathsf{P-1}\rrbracket$:
101 x_i^{n-1} & \text{ if }S_1^n\neq i \\
102 m_{S_2^n} & \text{ if }S_1^n=i.
109 m_j^{n-1} & \text{ if }S_3^n\neq j \\
110 \overline{m_j^{n-1}} & \text{ if }S_3^n=j.
119 The stego-content is the Boolean vector $y = x^P \in
120 \mathbb{B}^\mathsf{N}$.
122 \subsection{Security study of the $\mathcal{CIS}_2$}
124 After having introduced the $\mathcal{CIS}_2$, we have studied its security in~\cite{fgb11:ip}.
127 \subsubsection{Stego-security}
129 We have proven in~\cite{fgb11:ip} that,
132 $\mathcal{CIS}_2$ is stego-secure.
141 \subsubsection{Topological security}
144 \paragraph{Topological model}
146 We have firstly proven in~\cite{fgb11:ip} that $\mathcal{CIS}_2$ can be modeled as a
147 dynamical system in a topological space, as follows.
151 F: & \llbracket0;\mathsf{N-1}\rrbracket \times
152 \mathds{B}^{\mathsf{N}}\times \llbracket0;\mathsf{P-1}\rrbracket \times
153 \mathds{B}^{\mathsf{P}}
154 \longrightarrow \mathds{B}^{\mathsf{N}} \\
155 & (k,x,\lambda,m) \longmapsto \left( \delta
156 (k,j).x_j+\overline{\delta (k,j)}.m_{\lambda}\right) _{j\in
157 \llbracket0;\mathsf{N-1}\rrbracket}\\
162 \noindent where + and . are the boolean addition and product operations.
164 Consider the phase space $\mathcal{X}_2$ defined as follow:
167 \mathcal{X}_2 = \mathbb{S}_N \times \mathds{B}^\mathsf{N} \times \mathbb{S}_P
168 \times \mathds{B}^\mathsf{P} \times \mathbb{S}_P,
170 where $\mathbb{S}_N$ and $\mathbb{S}_P$ are the sets introduced in Section \ref{section:Algorithm}.
173 We define the map $\mathcal{G}_{f_0}:\mathcal{X}_2 \longrightarrow \mathcal{X}_2$ by:
176 \mathcal{G}_{f_0}\left(S_1,x,S_2,m,S_3\right) =
180 F(i_N(S_1),x,i_P(S_2),m),\sigma_P(S_2),G_{f_0}(m,S_3),\sigma_P(S_3)\right)
183 \noindent $\mathcal{CIS}_2$ can be described by the
184 iterations of the following discrete dynamical system:
190 X^0 \in \mathcal{X}_2 \\
191 X^{k+1}=\mathcal{G}_{f_0}(X^k).%
196 Then, by comparing $\mathcal{X}_2$ and the phase space $\mathcal{X}$ formerly introduced in
197 this document, we have verified in~\cite{fgb11:ip} that.
200 The phase space $\mathcal{X}_2$ has, at least, the cardinality of the continuum.
205 % This result is independent on the number of cells of the system.
209 \paragraph{A new distance on $\mathcal{X}_2$}
211 We have defined in~\cite{fgb11:ip} a new distance on $\mathcal{X}_2$ as follows:
212 $\forall X,\check{X} \in \mathcal{X}_2,$ if $X =(S_1,x,S_2,m,S_3)$ and $\check{X} =
213 (\check{S_1},\check{x},\check{S_2},\check{m}, \check{S_3}),$ then:
216 d_2(X,\check{X}) & = &
217 d_{\mathds{B}^{\mathsf{N}}}(x,\check{x})+d_{\mathds{B}^{\mathsf{P}}}(m,\check{m})\\
219 d_{\mathbb{S}_N}(S_1,\check{S_1})+d_{\mathbb{S}_P}(S_2,\check{S_2})+d_{\mathbb{S}_P}(S_3,\check{S_3}).
224 \paragraph{Continuity of $\mathcal{CIS}_2$}
226 To prove that $\mathcal{CIS}_2$ is another example of topological chaos in the
227 sense of Devaney, $\mathcal{G}_{f_0}$ must be continuous on the metric
228 space $(\mathcal{X}_2,d_2)$. We thus have proven in~\cite{fgb11:ip} that,
231 $\mathcal{G}_{f_0}$ is a continuous function on $(\mathcal{X}_2,d_2)$.
235 \paragraph{$\mathcal{CIS}_2$ is chaotic}
236 \label{section:chaos-security}
240 Then, in~\cite{fgb11:ip}, $(\mathcal{X}_2,\mathcal{G}_{f_0})$ has been proven to be topologically transitive, regular,
241 and sensitive dependence on initial conditions. We thus have the result~\cite{fgb11:ip}:
243 \begin{Th}%[$\mathcal{G}_{f_0}$ is a chaotic map]
245 $\mathcal{G}_{f_0}$ is a chaotic map on $(\mathcal{X}_2,d_2)$ in the sense of Devaney.
247 So we can claim that $\mathcal{CIS}_2$ is topologically secure.
252 \subsection{Correctness and completeness studies}
253 \label{sub:ci2:discussion}
255 Without attack, the $\mathcal{CIS}_2$ scheme has to ensure that the user can always extract a
256 message and that this latter is the watermark, provided the user has the
257 correct keys. These two demands
258 correspond respectively to the study
259 of completeness and of correctness
260 for the proposed approach, which have been
261 investigated in~\cite{bcfg+13:ip}. We have firstly established that,
264 Let $\Im(S_p)$ be the set (without repetitions)
265 $ \{S^1_p, S^2_p, \ldots, S^l_p\}$ of cardinality $k$, $k \leq l$.
266 This set contains all the elements of $x$ that have been modified
267 along the $\mathcal{CIS}_2$ iteration process.
268 Let us consider $\Im(S_c)_{|D}$ defined by
269 $\{S^{d_1}_c, S^{d_2}_c, \ldots, S^{d_k}_c\}$
271 $d_i$ is the last iteration that has modified the element $i \in \Im(S_p)$.
273 Message can be extracted from the stego-content if and only if
274 $\Im(S_c)_{|D}=\llbracket 0 ;\mathsf{P} -1 \rrbracket$.
278 Under this condition, one bit of index $j$ of the original message $m^0$
279 is thus embedded at least twice in $x^l$.
280 By counting the number of times this bit has been switched in $S_m$, the value of
281 $m_j$ can be deduced in many places.
282 Without attack, all these values are equal and the message is immediately
284 After an attack, the value of $m_j$ is obtained as mean value of all
286 The scheme is thus complete.
287 Notice that if the cover is not attacked, the returned message is always equal to the original
288 due to the definition of the mean function.
291 \subsection{Deciding whether a possibly attacked media is watermarked}
292 \label{sub:ci2:distances}
294 Let us consider a first media $y$ that is watermarked with a message $m$
295 and a second one, namely $y'$, which is an altered version of $y$, \textit{i.e.}, where
296 some bits have been modified.
297 Let $m'$ be the message that is extracted from $y'$.
299 We have checked in~\cite{bcfg+13:ip} how far the extracted message $m'$ is from $m$.
300 To achieve this, we have considered the set
301 $M = \{ i | m_i = 1 \}$ of the Boolean vector message $m$ and similarly
302 the set $M'$ for the message $m'$.
303 Most of similarity measures
304 depend on the functions $a$, $b$, $c$, and
306 $\mathbb{B}^{\mathsf{P}} \times \mathbb{B}^{\mathsf{P}}$ to $\mathbb{N}$,
307 and respectively equal to
308 $a(m,m') = |M \cap M' |$,
309 $b(m,m') = |M \setminus M' |$,
310 $c(m,m') = |M' \setminus M|$, and
311 $d(m,m') = |\overline{M} \cap \overline{M'}|$
312 ($|S|$ and $\overline{S}$ respectively
313 denote the cardinality
314 and the complementary
316 In what follows $a$, $b$, $c$, and $d$ respectively stand for
317 $a(m,m')$, $b(m,m')$, $c(m,m')$, and $d(m,m')$.
320 to~\cite{rifq/others03}
321 the Fermi-Dirac measure $S_{\textit{FD}}$
322 is the one that has the highest discrimination power, \textit{i.e.},
323 which allows a clear separation between correlated vectors and
325 The measure is recalled hereafter with
326 respect to the previously defined scalars $a$, $b$, and $c$.
329 S_{\textit{FD}}(\varphi) &= &
330 \dfrac{F_{\textit{FD}}(\varphi) -F_{\textit{FD}}(\frac{\pi}{2})}
331 {F_{\textit{FD}}(0) -F_{\textit{FD}}(\frac{\pi}{2})},\\
332 F_{\textit{FD}}(\varphi) &= &
333 \dfrac{1}{1+\exp(\dfrac{\varphi - \varphi_0}{\gamma})},\\
334 %\varphi &= &\arctan(\dfrac{b+c}{a})
336 \noindent where $\varphi = \arctan(\dfrac{b+c}{a})$, $\varphi_0$ is $\pi/4$, and $\gamma$ is 0.1.
338 The distance between $m$ and $m'$ is then computed in~\cite{bcfg+13:ip} as
339 $1-S_{\textit{FD}}(m,m')$ and is thus a real number in $[0;1]$.
340 We have proposed in~\cite{bcfg+13:ip} that, if such a distance is lower
341 than a given threshold, $y'$ will be
342 declared as watermarked and not watermarked otherwise.
343 Next section presents a practical robustness evaluation of
344 $\mathcal{CIS}_2$ using this decision rule.
348 \subsection{Robustness study of the process}
351 This section is devoted to the recall of the
352 robustness study of the $\mathcal{CIS}_2$ scheme realized in~\cite{bcfg+13:ip}.
353 For the whole experiments, a set of 100 images has been randomly extracted
354 from the database taken from the BOSS contest~\cite{Boss10}.
355 In this set, each cover is a $512\times 512$
356 grayscale digital image.
357 The considered watermark $m$ is given in Fig.~\ref{invad}.
358 Testing the robustness of the approach is achieved by successively applying
359 on watermarked images attacks like cropping, compression, geometric
360 transformations,\ldots
361 Differences between $m$ and $m'$ have been
362 computed as described in the previous section.
365 We have firstly evaluate the robustness of the $\mathcal{CIS}_2$ approach by
366 applying different percentages of cropping, from 0.25\% to 90\%.
367 Results are recalled in Fig.~\ref{Fig:atck:dec}, %.
368 which presents effects of such an attack.
369 All the percentage differences are so far less than 97\%
370 and thus robustness is established.
376 \includegraphics[width=0.5\textwidth]{IH/iihmsp13/exp/atq-dec}\label{Fig:atq:dec:curves}%}
377 \caption{Cropping Results}
383 Robustness against compression has then been addressed in~\cite{bcfg+13:ip},
384 by studying both JPEG and JPEG 2000 image compressions.
385 Results are respectively presented in Fig.~\ref{Fig:atq:jpg:curves}
386 and Fig.~\ref{Fig:atq:jp2:curves}.
387 It is not hard to see that robustness is well established for
388 JPEG2000 compression: for all the ratios larger than 10\%, the watermark
390 However, as stated in~\cite{bcfg+13:ip}, this scheme is not robust against JPEG compression for a ratio inferior
392 Remark that a potential solution can be to insert the
393 watermark in least significant coefficient of the image described in frequency
394 domain, for instance using either discrete cosine or with wavelet transform.
397 \subfigure[JPEG Effect]{
398 \includegraphics[width=0.45\textwidth]{IH/iihmsp13/exp/atq-jpg}\label{Fig:atq:jpg:curves}}
399 \subfigure[JPEG 2000 Effect]{
400 \includegraphics[width=0.45\textwidth]{IH/iihmsp13/exp/atq-jp2}\label{Fig:atq:jp2:curves}}
401 \caption{Compression Results}
402 \label{Fig:atck:comp}
405 Among geometric transformations, we then focused on
406 rotations, \textit{i.e.}, when two opposite rotations
407 of angle $\theta$ are successively applied around the center of the image.
408 In these geometric transformations, angles range from 2 to 60
410 Results are presented in Fig.~\ref{Fig:atq:rot}: thanks to an
411 efficient embedding, our scheme is resistant to all
412 that type of attacks.
418 \includegraphics[width=0.5\textwidth]{IH/iihmsp13/exp/atq-rot}\label{Fig:atq:rot:curve}%}
419 \caption{Rotation Attack Results}
423 The first step of the $\mathcal{CIS}_2$ scheme studied in this subsection
424 has defined $x$ as the LSBs of the host image, it is thus based on LSB modifications.
425 We have then considered in~\cite{bcfg+13:ip} two types of attacks modifying these LSB sets (see
426 Fig~\ref{Fig:atq:lsb}). The former consists in setting to zero a subset of this one.
427 Results are expressed in Fig.~\ref{Fig:atq:lsb:curve} and
428 show that the scheme is robust, unless 95\% of the LSB is erased.
429 In this case the image is really damaged.
430 The latter consists in applying again this scheme on the watermarked image
431 but with another message.
432 Results of Fig.~\ref{Fig:atq:ci2:curve} show that this scheme is robust
433 against that type of attack, provided the number of iterations is
434 lesser than $1.75$ times the number of pixels.
435 With more iterations, the image is dramatically modified: more than 50\%
436 of the LSB is switched.
437 %However, future works present ideas to tackle
443 \subfigure[LSB erasing effects]{
444 \includegraphics[width=0.45\textwidth]{IH/iihmsp13/exp/atq-lsb}\label{Fig:atq:lsb:curve}}
445 \subfigure[Applying algorithm twice]{
446 \includegraphics[width=0.45\textwidth]{IH/iihmsp13/exp/atq-ci2}\label{Fig:atq:ci2:curve}}
448 \caption{LSB Modifications}
455 \subsection{Evaluation of the embeddings}
458 A Receiver Operating Characteristic (ROC) approach has finally
459 been implemented in~\cite{bcfg+13:ip}, to find
460 the most adapted threshold w.r.t. the separation between
461 watermarked images and other ones.
465 \includegraphics[width=0.5\textwidth]{IH/iihmsp13/exp/ROC}
467 \caption{ROC Curves for DWT or DCT Embeddings}\label{fig:roc:dwt}
470 Figure~\ref{fig:roc:dwt} recalls the obtained ROC curve.
471 This latter is close to the ideal one that is without
472 False Positive and False Negative answer.
473 The threshold with best results is a distance equal to 0.97.
474 With such a value, we can give some confidence intervals
475 for most of evaluated attacks. The
476 approach is resistant to all the cropping where percentage is less than 90\%,
477 to a JPEG2000 compression where quality ratio is greater than 5\%,
478 to all the rotation attacks,
479 and to LSB erasing when less than 95\% LSBs are set to 0.
483 \subsection{Lyapunov evaluation of $\mathcal{CIS}_2$}
486 We finally close the study of the $\mathcal{CIS}_2$ process by
487 recalling the way we evaluated its Lyapunov exponent in Secrypt13~\cite{bfg13:ip}.
490 \subsubsection{A topological semi-conjugacy between $\mathcal{X}_2$ and $\mathds{R}$}
491 \label{sec:topological-semiconjugacy}
493 In this section, by using a topological
494 semi-conjugacy, we recall that $\mathcal{CIS}_2$ modeled by $\mathcal{G}_{f_0}$ on
495 $\mathcal{X}$ can be described as iterations on a real interval.
496 To do so, new notations and terminologies must be introduced.
498 Let $\mathcal{X}_{(\mathsf{N};\mathsf{P})} =
499 \mathbb{S}_N \times \mathds{B}^\mathsf{N} \times \mathbb{S}_P \times \mathds{B}^\mathsf{P} \times \mathbb{S}_P$.
500 In what follows and for easy understanding,
501 we will assume that $\mathsf{N}=3$ and $\mathsf{P}=2$.
502 So $\mathsf{N}+\mathsf{P} =
503 5$ and $\mathsf{N}\mathsf{P}^2 = 12$. However, an equivalent formulation of the
504 following can be easily obtained by replacing the bases $5$ and $12$ by any base
505 $(\mathsf{N}+\mathsf{P})$ and $(\mathsf{N}\mathsf{P}^2)$.
506 $\mathsf{N}$ has only
507 to be greater than $\mathsf{P}$.
510 \label{def:psi-function}
511 The function $\psi: \llbracket 1,\mathsf{N}\rrbracket \times \llbracket
512 1,\mathsf{P}\rrbracket \times \llbracket
513 1,\mathsf{P}\rrbracket \rightarrow \llbracket
514 0,\mathsf{N}\mathsf{P}^2-1\rrbracket$ is defined by:
515 $\psi \left(S_p^i,S_c^i,S_m^i\right)=(S_p^i-1) \mathsf{P}^2 + (S_c^i-1)
516 \mathsf{P} + (S_m^i-1)$.
518 This function aims to convert a strategy of triplets
519 in a simple strategy of integers expressed in a different basis, see Table~\ref{tablePsi}.
520 Obviously, $\psi$ is a bijective
521 function, the reverse operation will be denoted by $\psi^{-1}$. The three
522 projections of $\psi^{-1}$ are denoted by: $\psi^{-1}_1\left(\psi \left(S_p^i,S_c^i,S_m^i\right)\right)=S_p^i$, $\psi^{-1}_2\left(\psi \left(S_p^i,S_c^i,S_m^i\right)\right)=S_c^i$, and $\psi^{-1}_3\left(\psi \left(S_p^i,S_c^i,S_m^i\right)\right)=S_m^i$.
527 \begin{tabular}{|c|c|c|c|}
529 Base&Base&Base&Base\\
530 $\mathsf{N}=3$ & $\mathsf{P}=2$ &
531 $\mathsf{P}=2$&$\mathsf{N}\mathsf{P}^2=12$\\
534 $S_p^i$ & $S_c^i$ & $S_m^i$&$\psi \left(S_p^i,S_c^i,S_m^i\right)$\\
552 \caption{Some values for $\psi$~(see Definition~\ref{def:psi-function}).}
559 $\varphi: \mathcal{X}_{(\mathsf{3};\mathsf{2})} = \mathbb{S}_{3} \times
560 \mathds{B}^\mathsf{3} \times \mathbb{S}_2 \times \mathds{B}^\mathsf{2} \times
561 \mathbb{S}_2 \longrightarrow \big[ 0, 2^{5} \big[$,
562 as follows. If $\left(S_p,E,S_c,M,S_m\right) = \left((S_p^0, S_p^1, \hdots );
563 (E_0,E_1,E_2, E_3);(S_c^0, S_c^1, \hdots );(M_0,M_1);(S_m^0, S_m^1, \hdots
565 $\varphi \left(S_p,E,S_c,M,S_m\right)$ is the real number:
567 \item whose integral part $e$ is $\displaystyle{\sum_{k=0}^2 2^{4-k}
568 E_k + \sum_{k=3}^4 2^{4-k}M_{k-3}}$, that
569 is, the binary digits of $e$ are $E_0 ~ E_1 ~ E_2 ~ M_0 ~ M_1$.
570 \item whose decimal part $s$ is equal to:
572 \left(S_p^0,S_c^0,S_m^0\right)~ \psi
573 \left(S_p^1,S_c^1,S_m^1\right)~ \psi
574 \left(S_p^2,S_c^2,S_m^2\right)~ \hdots$
575 $ = \sum_{k=1}^{+\infty} 12^{-k}
576 S^{k-1}.$ $s$ is thus expressed in base $12$.
582 As notified in~\cite{bfg13:ip}, $\varphi$ realizes the association between a point of
583 $\mathcal{X}_{(\mathsf{3};\mathsf{2})}$ and a real number into $\big[ 0, 2^{5}
584 \big[$. We must now translate the steganographic process
585 $\mathcal{CIS}_2$, which is represented by $\mathcal{G}_{f_0}$, as %based on chaotic
586 iterations on this real interval. To do so,
587 two intermediate functions over $\big[ 0, 2^{5}
588 \big[$ denoted by $e$ and $s$ has been introduced in~\cite{bfg13:ip}.
592 Let $x \in \big[ 0, 2^{5} \big[$ and:
594 \item $e_0, \hdots, e_4$ the binary digits of the integral part of $x$:
595 $\displaystyle{\lfloor x \rfloor = \sum_{k=0}^{4} 2^{4-k} e_k}$.
596 \item $(s^k)_{k\in \mathds{N}}$ the digits of $x$, expressed in base $12$, where
598 decomposition of $x$ is the one that does not have an infinite number of
600 $\displaystyle{x = \lfloor x \rfloor + \sum_{k=0}^{+\infty} s^k
603 $e$ and $s$ are thus defined as follows:
606 e: & \big[ 0, 2^{5} \big[ & \longrightarrow & \mathds{B}^{3} \times
607 \mathds{B}^{2}\\ & x & \longmapsto & ((e_0,e_1,e_2);(e_3,e_4))
613 s: & \big[ 0, 2^{5} \big[ & \longrightarrow & \llbracket 0, 11
614 \rrbracket^{\mathds{N}} \\
615 & x & \longmapsto & (s^k)_{k \in \mathds{N}}\\
620 We have thus been able to define the function $g$, whose goal is to translate
621 the steganographic process $\mathcal{CIS}_2$ represented by $\mathcal{G}_{f_0}$
622 on an interval of $\mathds{R}$~\cite{bfg13:ip}.
624 \begin{Def}\label{def:function-g-on-R}
625 $g:\big[ 0, 2^{5} \big[ \longrightarrow \big[ 0, 2^{5} \big[$ is
626 such that $g(x)$ is the real number of $\big[ 0, 2^{5} \big[$
629 \item its integral part has a binary decomposition equal to $e_0',
631 e_4'$, with $\forall i \in \llbracket 0,2 \rrbracket$:
635 e(x)_i & \textrm{ if } i \neq \psi^{-1}_1\left(s^0\right)\\
636 e(x)_{2+\psi^{-1}_2\left(s^0\right)} & \textrm{ if } i =
637 \psi^{-1}_1\left(s^0\right)\\
641 and $\forall i \in \llbracket 3,4 \rrbracket$:
645 e(x)_i & \textrm{ if } i \neq \psi^{-1}_3\left(s^0\right)\\
646 e(x)_i + 1 \textrm{ (mod 2)} & \textrm{ if } i = \psi^{-1}_3\left(s^0\right),\\
651 whose decimal part is $s(x)^1, s(x)^2, \hdots$
657 In other words, if $x = \displaystyle{\sum_{k=0}^{4} 2^{4-k} e_k +
658 \sum_{k=0}^{+\infty} s^{k} ~12^{-k-1}}$, then:
660 \displaystyle{\sum_{k=0}^{2} 2^{4-k} \left[e_k
661 \left(\delta(k,\psi^{-1}_1(s^0))+1 \textrm{ (mod 2)}\right)+e_{2+\psi^{-1}_2(s^0)}\left(\delta(k,\psi^{-1}_1(s^0))\right)\right]}
664 + \displaystyle{\sum_{k=3}^{4} 2^{4-k} (e_k +
665 \delta(k,\psi^{-1}_3(s^0) \textrm{ (mod 2)})+\sum_{k=0}^{+\infty} s^{k+1}
667 where $\delta$ is the discrete Boolean metric
668 introduced previously.
671 Numerous metrics can be defined on the set $\big[ 0, 2^{5} \big[$, the
673 usual one being the Euclidian distance
674 $\Delta(x,y) = |y-x|^2$.
675 However, this Euclidian distance does not reproduce exactly the notion of
676 proximity induced by distance $d_2$ on $\mathcal{X}_2$ introduced in a previous
677 section, which is more relevant for the targetted applications.
678 Indeed $d_2$ is richer than $\Delta$, this is why we have introduced the
679 following map in~\cite{bfg13:ip}.
682 Given $x,y \in \big[ 0, 2^{5} \big[$,
683 $D$ denotes the function from $\big[ 0, 2^{5} \big[^2$ to $\mathds{R}^
685 defined by: $D(x,y) = D_e\left(e(x),e(y)\right) + D_s
686 \left(s(x),s(y)\right)$,
689 $\displaystyle{D_e(e,\check{e}) = \sum_{k=0}^\mathsf{4} \delta (e_k,
690 \check{e}_k)}$, ~~and~ $\displaystyle{D_s(s,\check{s}) = \sum_{k = 1}^
692 \dfrac{|s^k-\check{s}^k|}{12^k}}$.
696 We have thus proven in~\cite{bfg13:ip} that,
699 $D$ is a distance on $\big[ 0, 2^{5} \big[$.
704 The convergence of sequences according to $D$ is not the same than the
706 convergence related to the Euclidian metric. For instance, if $x^n \to x
708 according to $D$, then necessarily the integral part of each $x^n$ is
710 the integral part of $x$ (at least after a given threshold), and the
712 part of $x^n$ corresponds to the one of $x$ ``as far as required''.
713 $D$ is richer and more refined than the Euclidian distance, and thus is
717 $\varphi$ has been constructed in order to be continuous and onto,
719 we obtained the following theorem in~\cite{bfg13:ip}.
722 The steganographic process $\mathcal{CIS}_2$ represented by
723 $\left(\mathcal{G}_{f_0},\mathcal{X}_2\right)$ can be considered as simple iterations on
724 $\mathds{R}$, which is illustrated by the semi-conjugacy given
728 \left(~\mathcal{X}_{(3;2)}, d_2~\right) @>\mathcal{G}_{f_0}>>
729 \left(~\mathcal{X}_{(3;2)}, d_2~\right)\\
730 @V{\varphi}VV @VV{\varphi}V\\
731 \left( ~\big[ 0, 2^{5} \big[, D~\right) @>>g> \left(~\big[ 0, 2^{5}
739 In other words, $\mathcal{X}_2$ is approximately equal to $\big[ 0, 2^{
740 \mathsf{N}+\mathsf{P}}
742 We have thus remarked in~\cite{bfg13:ip} that,
745 \label{Prop:derivabilite-de-g}
746 The process $\mathcal{CIS}_2$ represented by $g$ defined on $\mathds{R}$ has
747 derivatives of all orders on
748 $\big[ 0, 2^{5} \big[$, except on the 385 points in $I$ defined by:
750 \dfrac{n}{12} ~\big/~ n \in \llbracket 0;2^{5}\times 12\rrbracket
753 Furthermore, on each interval of the form $\left[ \dfrac{n}{12},
754 \dfrac{n+1}{12}\right[$, with $n \in \llbracket 0;2^{5}\times 12
756 $g$ is a linear function having a slope equal to 12: $\forall x \notin
761 We are now able to recall the way to evaluate the Lyapunov exponent of $\mathcal{CIS}_2$.
763 \subsubsection{Topological security of $\mathcal{CIS}_2$ on $\mathds{R}$}
764 \label{section:topo-secu-cis2-R}
766 $\mathcal{CIS}_2$ represented by the function $\mathcal{G}_{f_0}$ on
767 $\mathcal{X}_2$ is topologically secure, that is to say $\left(\mathcal{G}_{f_0}, \mathcal{X}_2\right)$ is chaotic in the sense of Devaney. We can deduce
768 the same property for $\mathcal{CIS}_2$ represented by the $g$ function on
769 $\mathds{R}$ for the order topology. Indeed
770 $\left(\mathcal{G}_{f_0}, \mathcal{X}_2\right)$ and $\left(g, [ 0,
771 2^{5} [_D\right)$ are semi-conjugate by $\varphi$ as recalled below.
772 So $\left(g, [ 0, 2^{5} [_D\right)$ is a chaotic system
773 according to Devaney, because the semi-conjugacy preserves this character~\cite{Formenti1998}.
774 However the topology generated by $D$ is finer than the topology
775 generated by the Euclidean distance $\Delta$, which is the order topology.
776 This is why we have proven in~\cite{bfg13:ip} that,
778 \label{theo:chaos-and-fineness}
779 Let $\mathcal{X}$ be a set, and $\tau, \tau'$ two topologies on
780 $\mathcal{X}$ such that $\tau'$ is finer than $\tau$. Let $f:\mathcal{X}
781 \to \mathcal{X}$, continue for both $\tau$ and $\tau'$.
783 If $(\mathcal{X}_{\tau'},f)$ is chaotic in the sense of Devaney, then
784 $(\mathcal{X}_\tau,f)$ is also chaotic.
787 Finally, according to Theorem~\ref{theo:chaos-and-fineness}, we have
788 deduced in~\cite{bfg13:ip} that
789 the steganographic process $\mathcal{CIS}_2$ represented by $g$ is
790 chaotic in the sense of Devaney, for the order topology on $\mathds{R}$.
791 Having these assertions in mind, we have then formulated the following theorem:
793 \label{th:cis2-topo-order}
794 The steganographic process $\mathcal{CIS}_2$ represented by $g$ on $\mathds{R}$
795 is chaotic in the sense of Devaney, when the usual topology of $\mathds{R}$ is
796 used (the order topology).
800 This result is weaker than Theorem~\ref{theo:chaotic}, which
801 establishes the chaotic property of $\mathcal{CIS}_2$ for a finer topology. It is
802 as if the chaos observed using usual tools like the Euclidian distance
803 is still preserved when considering more powerful tools (higher resolution,
804 \emph{i.e.}, finer topologies).
805 The result contained in Theorem~\ref{th:cis2-topo-order} is however interesting,
806 as it confirms that approach followed in~\cite{bfg13:ip} does not lead to deflated properties.
808 Indeed, our studies take place in a system other than the one usually considered in
809 computer science ($\mathcal{X}_2$ instead of $\mathds{R}$),
810 in order to be as close as possible to the targetted computer machines.
811 By doing so, we prevent from any loss of chaotic properties
812 when computing the scheme written in mathematical terms.
813 However, it might be feared that the choice of a
814 discrete mathematics approach leads to a disorder of lower quality.
815 In other words, perhaps we have avoided a
816 situation of great disorder \emph{lost} during the computation into finite machines.
817 But the cost of such success may be to obtain a weaker disorder ?
818 Theorem~\ref{th:cis2-topo-order} proves exactly the contrary.
822 \subsubsection{Evaluation of the Lyapunov exponent}
823 \label{section:lyapunov-exponent-evaluation}
825 Let $\mathcal{L} = \left\{ x^0 \in \big[ 0, 2^{5} \big[ ~ \big/ ~ \forall n
826 \in \mathds{N}, x^n \notin I \right\}$, where $I$ is the set of points in the
827 real interval where $g$ is not differentiable (as it is explained in Proposition
828 \ref{Prop:derivabilite-de-g}). Then~\cite{bfg13:ip}.
831 $\forall x^0 \in \mathcal{L}$, the Lyapunov exponent of $\mathcal{CIS}_2$ having
832 $x^0$ for initial condition is equal to $\lambda(x^0) = \ln (12)>0$.
837 The set of initial conditions for which this exponent is not calculable is countable.
838 This is indeed the initial conditions such that an iteration value will be a
839 number having the form $\dfrac{n}{12}$, with $n\in \mathds{N}$.
840 Moreover, for a system having $\mathsf{N}+\mathsf{P}$
841 cells (a number of LSCs equal to $\mathsf{N}$ and a secret message to embed of
842 width equal to $\mathsf{P}$), we will find, \emph{mutatis mutandis}, an infinite
843 uncountable set of initial conditions $x^0 \in \left[0;2^\mathsf{N+P}\right[$
844 such that $\lambda (x^0) = \ln (\mathsf{N}\mathsf{P}^2)$.
849 So, it is possible to make the Lyapunov exponent of the
850 scheme $\mathcal{CIS}_2$ as large as possible, depending on the number of least
851 significant coefficients of the cover media we decide to consider, and
852 on the width of the message to embed. As proven in~\cite{gfb10:ip}, a large Lyapunov exponent makes
853 it impossible to achieve the well-known ``Estimated Original Attacks''~\cite{Cayre2008}.