2 \citation{Dawei2004,4722496}
5 \newlabel{sec:introduction}{{}{1}}
6 \@writefile{toc}{\contentsline {section}{\numberline {I}The Steganography Scheme $\ensuremath {\mathcal {CI}}\xspace $}{1}}
7 \newlabel{section:process-ci2}{{I}{1}}
8 \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-A}}Notations used for \ensuremath {\mathcal {CI}}\xspace }{1}}
9 \newlabel{sec:ci2:notations}{{\unhbox \voidb@x \hbox {I-A}}{1}}
10 \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-B}}The $\ensuremath {\mathcal {CI}}\xspace $ scheme}{1}}
11 \newlabel{sub:ci2:scheme}{{\unhbox \voidb@x \hbox {I-B}}{1}}
12 \citation{rifq/others03}
13 \newlabel{itm2:Sc}{{2}{2}}
14 \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-C}}Correctness and Completeness Studies}{2}}
15 \newlabel{sub:ci2:discussion}{{\unhbox \voidb@x \hbox {I-C}}{2}}
16 \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-D}}Deciding whether a Media is Watermarked}{2}}
17 \newlabel{sub:ci2:distances}{{\unhbox \voidb@x \hbox {I-D}}{2}}
19 \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces The Watermark}}{3}}
20 \newlabel{(b) Watermark}{{1}{3}}
21 \@writefile{toc}{\contentsline {section}{\numberline {II}Robustness Study of $\ensuremath {\mathcal {CI}}\xspace $}{3}}
22 \newlabel{sec:robustness}{{II}{3}}
23 \newlabel{Fig:atq:dec:curves}{{II}{3}}
24 \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Cropping Results}}{3}}
25 \newlabel{Fig:atck:dec}{{2}{3}}
26 \newlabel{Fig:atq:jpg:curves}{{3(a)}{3}}
27 \newlabel{sub@Fig:atq:jpg:curves}{{(a)}{3}}
28 \newlabel{Fig:atq:jp2:curves}{{3(b)}{3}}
29 \newlabel{sub@Fig:atq:jp2:curves}{{(b)}{3}}
30 \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Compression Results}}{3}}
31 \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{3}}
32 \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{3}}
33 \newlabel{Fig:atck:comp}{{3}{3}}
34 \newlabel{Fig:atq:rot:curve}{{II}{3}}
35 \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Rotation Attack Results}}{3}}
36 \newlabel{Fig:atq:rot}{{4}{3}}
41 \bibcite{Dawei2004}{2}
43 \bibcite{rifq/others03}{4}
45 \newlabel{Fig:atq:lsb:curve}{{5(a)}{4}}
46 \newlabel{sub@Fig:atq:lsb:curve}{{(a)}{4}}
47 \newlabel{Fig:atq:ci2:curve}{{5(b)}{4}}
48 \newlabel{sub@Fig:atq:ci2:curve}{{(b)}{4}}
49 \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces LSB Modifications}}{4}}
50 \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB Erasing Effect}}}{4}}
51 \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying Algorithm twice}}}{4}}
52 \newlabel{Fig:atq:lsb}{{5}{4}}
53 \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-A}}Evaluation of the Embeddings}{4}}
54 \newlabel{sub:roc}{{\unhbox \voidb@x \hbox {II-A}}{4}}
55 \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{4}}
56 \newlabel{fig:roc:dwt}{{6}{4}}
57 \@writefile{toc}{\contentsline {section}{\numberline {III}Conclusion}{4}}
58 \newlabel{sec:conclusion}{{III}{4}}
59 \@writefile{toc}{\contentsline {section}{References}{4}}