2 Recently, chaos has become an usual technique to define schemes used
3 %for encryption~\cite{Lang20102092} or information hiding~\cite{Dawei2004,4722496}.
4 for encryption or watermarking~\cite{Dawei2004,4722496}.
5 In this context, embedded watermarks can be either visible or invisible.
6 In the former case, the mark overlays the image host and is thus visible
7 In the later case, the mark is embedded in such a way that the differences
8 between the original host and the watermarked one are perceptually
11 Our invisible chaos-Based watermarking scheme
12 proposed in this research work uses such kind of techniques.
13 It is an extension of a previously released watermarking
14 method~\cite{fgb11:ip} in the direction of quality analysis.
17 geometrical attacks and signal processing
18 is studied.% and compared with other
19 % existing robust schemes like those proposed
20 % in~\cite{4722496,Dawei2004,JMM0403112119}.
28 The remainder of this document is organized as follows.
29 In Section~\ref{section:process-ci2}, the watermarking scheme is given.
31 correctness and the completeness of the approach has been proven. This
32 is the first contribution of the paper.
34 Section~\ref{sec:robustness}, the robustness of \CID is studied facing
35 geometrical and signal processing attacks through a large number of
36 experiments. This is the second contribution.
37 The documents ends with a conclusion
38 section, where our contribution is summarized and intended future
39 researches are presented.